re

i18 Challenge - Part 2

4 minute read Published:

Here is the second part of the i18 CTF with 4 more challenges. This time I learned about Reverse Engineering, DNS lookup, more RE, and finally some steganography that ended up not working.
5: Lett fluidmekanikk An executable file. Clue one: The program also accepts the password as an argument. Clue two: The password exists (perhaps) in a dictionary. We get an executable file asking for a password. Enter the wrong one and it quits. I’m a complete beginner in Reverse Engineering but I have enjoyed a few tutorial videos so let’s jump right in with Immunity. When you open the file, right click View module ‘crackme’.