Secure Auth v0
Reverse Engineering
Last updated
Reverse Engineering
Last updated
One of NorzhNuclea's developers joined the team last quarter, specialized in authentication systems he found one he developed a few years ago with a innovative obfuscation method. Find the correct password to validate the checks.
by Masterfox
Decompiling the binary shows that it’s filled with a large number of NOPs.
However, it turns out we can use ltrace
to view the library calls and see the strcmp
parameters. This is the part where our password gets checked against a hardcoded string.
Our password goes through some transformation before being compared, so we have to fuzz the input to understand what transformations are being applied. From the above screenshot, we can see that 4 characters are processed at a time.
By changing one character at a time, we can understand how these 4 characters are transformed.
4 characters are processed at a time
First character of plaintext, p1
is related to the fourth character of ciphertext c4
p2
is related to c3
p3
is related to c2
p4
is related to c1
By incrementing one character at a time, we know that this is a substitution cipher.
The solution is as follows: