An open API service indexing awesome lists of open source software.

https://github.com/codingo/cracknet

A .net Crackme Challenge made for the SecTalks Brisbane 2017 Capture the Flag Event. Writeup/solution included.
https://github.com/codingo/cracknet

capture-the-flag challenge challenges ctf ctf-challenges ctf-solutions ctf-writeups decompile ida radare2 reverse-engineering security vulnerable vulnerable-application writeup

Last synced: 2 months ago
JSON representation

A .net Crackme Challenge made for the SecTalks Brisbane 2017 Capture the Flag Event. Writeup/solution included.

Awesome Lists containing this project

README

        

# cracknet
A .net Crackme Challenge made for the SecTalks Brisbane 2017 CTF Event.

[![Twitter](https://img.shields.io/badge/twitter-@codingo__-blue.svg)](https://twitter.com/codingo_)

***Intended binary for challenge***: https://github.com/codingo/cracknet/blob/master/ctf.sectalks_bne.crackme/bin/Debug/cracknet.exe

Note that this is a debug build and not a release build, due to compiler instructions. Only the executable needs to be included for the challenge.

## Source Code Notes

Built with v4.5.2 of .Net (https://www.microsoft.com/en-au/download/details.aspx?id=42642)

## Writeup / Solution

A writeup explaining one solution path for this binary can be found here: https://codingo.github.io/reverse-engineering/ctf/2017/07/25/Decompiling-CSharp-By-Example-with-Cracknet.html

Further solution notes (including alternative ways to solve this) can be found as code comments within __Program.cs__.