B1g_Mac - 500 points
Description
Here’s a zip file. You can also find the file in /problems/b1g-mac_0_ac4b0dbedcd3b0f0097a5f056e04f97a.
Flag
picoCTF{M4cTim35!}
Solution
Upon reversing the binary, I noticed a function called _decode
that is never called. To have the challenge solve itself all I needed to do was have this function be called in a debugger.
I opened main.exe
in x32dbg and set a breakpoint at 0x401B5E
, the address of call _listdir
(the “encode” function). Once this breakpoint was hit, I overwrote eip
with the address of _decode
: 0x401AFE
. Continuing after this prints the flag.