40% Off Career-Building Certificates
Master Windows Internals - Kernel Programming, Debugging & Architecture
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn reverse engineering and web exploitation techniques through a comprehensive walkthrough of the "Ultimate Calculator 3000" CTF challenge. Master static analysis using Ghidra to examine binary files, perform dynamic analysis with pwndbg for runtime debugging, and capture network traffic with Wireshark to uncover hidden services. Discover how to locate hidden validator routines within calculator binaries, identify secondary HTTP services, and obtain offline validation tools through subdomain enumeration. Explore Go binary reverse engineering to expose HMAC-based serial verification systems, then develop custom keygens to craft valid serials that bypass authentication mechanisms. Practice binary patching techniques, network traffic analysis for discovering hidden subdomains through HTTP Link headers, and LLM-assisted code recovery for understanding obfuscated Go implementations. Build practical skills in extracting HMAC salts, reproducing verification algorithms, and creating automated solve scripts in Python for CTF challenges combining both reverse engineering and web exploitation methodologies.
Syllabus
0:00 Intro
0:23 Basic file checks
1:38 Running the program
2:43 Static analysis ghidra
5:02 Binary patching
6:44 Dynamic analysis pwndbg
7:53 Capture network traffic wireshark
9:13 Hidden subdomain in Link header
11:51 Access backup subdomain and download validator
13:37 Inspect Go validator ghidra
16:03 Recover original Go code LLM
16:41 Extract HMAC salt and reproduce verification
18:04 Build offline keygen
20:19 Submit valid serial / get flag
21:13 Solve script python
22:03 Conclusion
Taught by
CryptoCat