Level 00 Solution

Straight forward solution

Using the hint provided in the README, extracting the flag is pretty straight forward.

$ strings main32 or main64
It's easy just look harder :)

Not so striaght forward but cool way

In this method we’ll make use of an awesome tool called radare2 which you can grab from here.

  1. First open the binary in radare2
$ r2 main32 or main64
  1. Then analyze the binary
[...]> aaa
  1. Disassemble the main function just to check what’s going on.
[...]> pdf

Nothing interesting over here.

  1. Now print the strings
[...]> iz

And there you have it.

radare2 screenshot


Level 00