# file challenge.exe
Run challenge.exe:
. Username = Cookie
. Serial Number = Monsters
. Check
> Authentication failed!
Attach to the process using windbg:
> * Load SOS and symbols
> .loadby sos mscorwks; .symfix; .reload
> * Show all threads
> ~
> * Show all managed threads
> !threads
> * Switch to thread 0 (new current thread)
> ~0s
> * View the stack
> !clrstack
> * Show objects on the heap (MT = MethodTable)
> !dumpheap -type StarwareCTF_DotNetChall
> * Show what methods the object exposes
> !dumpmt -md 00a0732c
> * Method disassemble
> !U 00a072ac
> * Display one dword (4b)
> dd 0BF1464h L1
> * Method disassemble
> !U 00de5960
> * Set breakpoint at address
> bp 00de5987
> * Go
> g
. Username = Cookie
. Serial Number = Monsters
. Check
> * Display Unicode chars
> du eax+c
> * Clear all breakpoints
> bc *
> * Go
> g
> Authentication failed!
. Username = Cookie
. Serial Number = 0C81B9E71D6397203F2B7C73233FC5A4D9C6450D8037BB12BE9415B950AC3E521EA1B1C42B4ACD482C83FFBBA8212BE228A71FE544E463B59C344F1A41A55262
. Check
> Authentication successful. Waiting for flag
Reference
http://blog.botbie.com/2013/11/21/cscamp-ctf-quals-2013-reversing-150-write-up/
No comments:
Post a Comment