<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>reversing on Security Addict</title><link>https://blog.medarkus.net/tags/reversing/</link><description>Recent content in reversing on Security Addict</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><managingEditor>me@darkus.dev (DeMarcus Williams)</managingEditor><webMaster>me@darkus.dev (DeMarcus Williams)</webMaster><lastBuildDate>Mon, 11 May 2020 13:54:50 -0500</lastBuildDate><atom:link href="https://blog.medarkus.net/tags/reversing/index.xml" rel="self" type="application/rss+xml"/><item><title>Sarctf2020 Crossw0rd</title><link>https://blog.medarkus.net/posts/sarctf2020-crossw0rd/</link><pubDate>Mon, 11 May 2020 13:54:50 -0500</pubDate><author>me@darkus.dev (DeMarcus Williams)</author><guid>https://blog.medarkus.net/posts/sarctf2020-crossw0rd/</guid><description>This is one of the reversing problems that I solved during SarCTF a couple months back in February of 2020. I decided to write this up since I believe it to a good beginner problem for people looking to get into reverse engineering.
Problem Description While the children were playing toys, Sherlock was solving crosswords in large volumes.
Reversing the Binary Using file we can see we&amp;rsquo;re given an unstripped 64-bit ELF file: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/l, for GNU/Linux 3.</description></item></channel></rss>