Home CTFs | FCSC2023 | Intro | Aaarg
Post
Cancel

CTFs | FCSC2023 | Intro | Aaarg

Aaarg

image

This chall is a reverse chall. When looking at the executable in Ghydra, we can see what looks like a flag in the .rodata section:

image

We then use r2. We use aaa to analyse the executable. We see a the address of .rodata using the iS command:

image

We then seek for the address of .rodata we just found and we can find the flag:

image

We can use the plx 20 command to read more and get the full flag:

image

The full flag is FCSC{f9a38adace9dda3a9ae53e7aec180c5a73dbb7c364fe137fc6721d7997c54e8d}.

This post is licensed under CC BY 4.0 by the author.