Reverse Easy.....
First we execute the binary
$ ./baby_re_2
Looking for the flag?
Enter the key: test
Wrong! Try Again ...
We try to analyze a binary to find the key using ghidra. We look up FUN_00101277
function and we see some interest.
First we look at line 19
we show a condition that will execute another function. And we see local_20
is an input variable and local_14
variable that equal = 0x140685
(Hex). Since the integer variable is readed as decimal so we try to convert the value of local_14
to Decimal.
140685 (Hex) = 1312389 (Decimal)
So we found the key and we try to execute again
$ ./baby_re_2
Looking for the flag?
Enter the key: 1312389
GrabCON{y0u_g0t_it_8bb31}
We got flag!