I don’t see any post for Bombs Landed yet. Been struggling with it for a couple of days. Without putting too much in here, I see the required arguments, but it can’t figure out if they do anything or find any references to them. I’ve also figured out the X to proceed but after that I’m just tossed to 0C and can’t figure out a way to alter it with input. I found main as well.
Is this challenge possible without having to alter binary? Do the inputs even matter?
It’s also possible to finish it by changing something while debugging, but a minor modification will make your life easier. To discover where, you should read up on the ELF structure a little
found anti debug trick so not the X password but the longer should be right t33l0 after that there is a strncmp that should be give the right password, but i can’t figure out waths going on, found something interesting (do|oxme) but cant really understand whats the point, any advice?
a week ago I finally solved this challenge. In the end, not that difficult. There’s something “hidden” within you should trigger. As someone has said, either you can manipulate your input to trigger that thing or, if you are like me, go for the lazy approach and patch something in the code.
found anti debug trick so not the X password but the longer should be right t33l0 after that there is a strncmp that should be give the right password, but i can’t figure out waths going on, found something interesting (do|oxme) but cant really understand whats the point, any advice?
yes me too i am struggling at that point and no idea with that
I’m at the point where it compares the input to the string on the stack and I can change the strcmp return value so that it prints theyou win. message. However, one of the characters it’s comparing to is not printable. I feel like there’s just one little thing I’m missing to complete the challenge.
Update: figured it out! For those who are stuck on the last part, I’ll give this (hopefully small) hint: the arguments to strncmp and the surrounding code are themselves a hint.
Would anyone who’s completed this be willing to give me some pointers?
My Linux RE experience is a little lackluster, and some of the (what I assume to be) anti-debug features are hindering me when trying to disassemble/decompile the binary. I’ve been trying to research it on my own, but as I don’t really know what it is that I’m looking for, that’s been difficult.
anyone here willing to share some knowledge? i can see that function that is pointing into the E** TLE for some reason but i cant figure out what its achieving;; plus i can debug this perfectly fine in gdb? i dont seem to have anti D*G problems like people are suggesting here