Ex02b.exe -
[e.g., Identify the hidden flag / Understand the encryption logic] Tools Used: Detect It Easy (File identification) Ghidra or IDA Free (Static analysis) x64dbg (Dynamic debugging) 2. Static Analysis
Identify the entry point and the primary loop. Key Logic: Does it ask for a password? Does it perform a mathematical transformation (XOR, ROT13)? ex02b.exe
Set a breakpoint at the or jump instruction ( JZ , JNZ ). Modify the EAX register to bypass the check. Observe the decrypted output in memory. 5. Conclusion & Solution The Flag/Key: [Insert Key Here] Does it perform a mathematical transformation (XOR, ROT13)
Briefly explain the "lesson" of the challenge (e.g., "This taught the basics of string obfuscation"). To give you a more detailed draft, could you tell me: Is this for a specific course or CTF ? What behavior do you see when you run it? Observe the decrypted output in memory
Include a small block of the cleaned-up pseudocode from your decompiler. 4. Dynamic Analysis (Execution)
Use the strings command to look for hardcoded messages or suspicious APIs (e.g., IsDebuggerPresent ).
Look for networking ( ws2_32.dll ) or file manipulation ( Kernel32.dll ) functions that hint at the program's behavior. 3. Decompilation & Logic Flow