Post

Crackme 0x02

I’ve recently started doing the Modern Binary Exploitation challenges, and figured i’d do writeups on them to consolidate my learning as I went.

Start

Marking crackme0x02 as executable with chmod +x crackme0x02 and running it provides with with a prompt to enter a password:

image

Ghidra

Opening this up in Ghidra, we can open up the function list on the left menu image

And we can see that it contains the main function if we scroll down:

image

This program has not been stripped of it’s debug symbols, so we can still see function names thankfully. Inside of the main function we have this:

image

Taking a look at our decompiled main, it looks like if the password we enter is equal to 0x52b24 we have found the correct password.

image

This is a hexadecimal number, so lets convert it to binary and give it a try!

image

Great, so this works but how does the assembly code work? I decided to try tracing the assembly code and this is what I came up with:

Below is the original ASM code, then my interpretation of the code

1
2
3
4
5
6
7
8
9
10
MOV        dword ptr [EBP + local_c],   0x5a00
MOV        dword ptr [EBP + local_10],  0x1ec00
MOV        EDX,                         dword ptr [EBP + local_10]
LEA        EAX+local_c,                 [EBP + -0x8]
ADD        dword ptr [EAX]+local_c,     EDX
MOV        EAX+local_c,                 dword ptr [EBP + -0x8]
IMUL       EAX,                         dword ptr [EBP + local_c]
MOV        dword ptr [EBP + local_10],  EAX
MOV        EAX,                         dword ptr [EBP + local_8]
CMP        EAX,                         dword ptr [EBP + local_10]
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
mov [EBP + local_c], 0x5a
local_c = 0x5a
local_c = 90

mov [EBP + local_10], 0x1ec
local_10 = 0x1ec
local_10 = 492

mov EDX, [EBP + local_10]
EDX = local_10
EDX = 492

lea EAX+local_c, [EBP + -0x8]
EAX = *local_c
EAX = 90

add [EAX]+local_c, EDX
local_c = local_c + EDX
local_c = 90 + 492
local_c = 582

mov EAX+local_c, [EBP + -0x8]
EAX = local_c
EAX = 582

imul EAX, [EBP + local_c]
EAX = EAX * (EBP + local_c)
EAX = 582 * 582

mov dword ptr [EBP + local_10],EAX
local_10 = EAX
local_10 = 338724

mov EAX,dword ptr [EBP + local_8]
EAX = local_8

cmp EAX,dword ptr [EBP + local_10]
EAX == local_10
input == 338724

Conclusion

After doing both static analysis with Ghidra and a stack trace of the assembly code, we can see that the password 338724 works, and we have successfully cracked this program!

This post is licensed under CC BY 4.0 by the author.