>_
Terminal
πŸ΄β€β˜ οΈ
Mini CTF
πŸ“Š
Activity
πŸ“…
Events
guest@dsr: ~
guest@dsr:~$ ./welcome.sh
guest@dsr:~$ cat reversingtaller.md
Última modificación: 03-10-2025

Taller Reversing .exe

https://www.youtube.com/channel/UCPNPSP20z4FGfgMJ71VOJjw/videos


; int __fastcall main(int argc, const char **argv, const char **envp)
main proc near

result= byte ptr -58h
access_key= byte ptr -50h
var_18= qword ptr -18h

; __unwind { // __GSHandlerCheck
push    rdi
sub     rsp, 70h
mov     rax, cs:__security_cookie
xor     rax, rsp
mov     [rsp+78h+var_18], rax
lea     rax, [rsp+78h+access_key]
mov     rdi, rax
xor     eax, eax
mov     ecx, 32h ; '2'
rep stosb
lea     rcx, _Format    ; "Ingrese la clave de acceso: "
call    printf
mov     edx, 28h ; '('  ; Size
lea     rcx, [rsp+78h+access_key] ; Buffer
call    cs:__imp_gets_s
lea     rcx, [rsp+78h+access_key] ; serial
call    ?myfuncion@@YA_NPEAD@Z ; myfuncion(char *)
mov     [rsp+78h+result], al
movzx   eax, [rsp+78h+result]
test    eax, eax
jz      short loc_140001107

Tecla X para ver sus usos

jz β†’ (if)

canary β†’ security code (C++)

call cs:__imp_gets_s β†’ lee teclado por entrada


EJ3

image.png

image.png

image.png

image.png

image.png


El 4

cada letra que pone se va sumando en hexadecimal. y luego se pone en decimal


<< cd ..

HackSimulator - Mini CTF

Top Hackers

  1. Loading...

OSINT Mini CTF

This is a timed competition. Your goal is to find all 4 flag fragments scattered across the simulated system using OSINT techniques.

Once you start, the timer will begin. Good luck.

Activity Monitor
Process Name ↕ % CPU ↓ % Memory ↕ Action

CPU 0.0%

30s history

Memory 0.0%

30s history
β€” processes CPU avg: β€” RAM avg: β€”
Events

Loading events...

>_
πŸ΄β€β˜ οΈ
πŸ“Š
πŸ“