Packer

https://play.picoctf.org/practice/challenge/421?category=3&difficulty=2&page=1

Static Analysis of the "out" Binary

After downloading the binary file named out, I began with static analysis using the strings utility:

Among the output, a few suspicious strings appeared:

The presence of "UPX!" indicates that the binary is packed using UPX (Ultimate Packer for eXecutables).

UPX is a popular open-source tool for compressing executables. It's often used in CTFs to obfuscate or shrink binaries, making reverse engineering a bit more challenging.

Usage:

Reanalyzing the Unpacked Binary

With the unpacked binary (binaryOut), I ran the strings command again:

This time, more readable and meaningful strings appeared a strong indication that deobfuscation succeeded.

The flag appeared to be encoded in hex .Simply use any online decoded to get the flag output. I copied it and used CyberChefarrow-up-right to decode it.

Last updated