π–ˆπ–žπ–‡π–Šπ–—π–Œπ–šπ–—π–šπŸ’€~$

Hamza's Blog

View on GitHub

Sha256 = Secure ?

This a challenge about the hashing algorithm called Sha256 link to challenge here, today we are going to reverse the logic implementation. A zip file was given in the site downloading and extracting we have:

we could see that the executable is a linux x86-64 non-striped binary, executing the file we have :

the program prompt us for a license key, plugging the program to Ghidra and decompiling the binary we have :

we could see that the program start execution from main function which performs:

One important thing to note from the function, is that the parameters that is passed to the generate_licenses function is time dependent, so each time the program is runned, the license key changes with this constraint in mind we could choose to write a script that generates the license key for the next 5 seconds and plug each one into the program till we get the correct one or use a debugger to get the content that is returned and stored in memory when the generate_licenses function is executed. Well let’s go with the easier approach that’s the latter.

Before going into the debugger what’s really going on in the generate_licenses_key function let’s check it out:

from the above pic we could see that :

Going into GDB debugger with the program:

from the assembly we could identify where the returned license key is stored in the heap memory which is at:

Setting a breakpoint at that line and running the program we hit the breakpoint, printing the content of the rax register reveals us our license key, submitting it to the program gives us our flag!!!!!!!!

But in this case our flag is not constant, it’s time Dependent(i.e it varies with time)