Back to Browse

IRCWare [easy]: HackTheBox Reversing Challenge (mapping syscalls)

3.4K views
May 4, 2021
25:48

Video walkthrough for retired @HackTheBox (HTB) Reverse Engineering challenge "IRC Ware" [easy]: "During a routine check on our servers we found this suspicious binary, although when analyzing it we couldn't get it to do anything. We assume it's dead malware, but maybe something interesting can still be extracted from it?" - Hope you enjoy 🙂 Sign up for HackTheBox: https://htb-signup.cryptocat.me ↢HackTheBox↣ https://htb-signup.cryptocat.me https://twitter.com/hackthebox_eu https://discord.gg/hackthebox ↢Video-Specific Resources↣ Ghidra cheatsheet: https://ghidra.re/CheatSheet.html Linux call table: https://blog.rchapman.org/posts/Linux_System_Call_Table_for_x86_64/ IRC docs: https://tools.ietf.org/html/rfc2812 👷‍♂️Resources🛠 https://cryptocat.me/resources ↢Chapters↣ Start - 0:00 Basic file checks - 0:30 Analyse in ghidra - 1:30 Map syscalls - 4:12 Establish connectivity - 10:04 Debug with GDB - 14:54 Decode algorithm - 21:32 Test password - 24:54

Download

0 formats

No download links available.

IRCWare [easy]: HackTheBox Reversing Challenge (mapping syscalls) | NatokHD