Reverse engineering challenge – part two

Okay, the second one is similar, needs one argument and then tells you it is incorrect if you try something random. I will try literally the same I did last time. I did  fhx crackme02.exe > hex2.txt and just ctrl+f for Yes in this txt file. There is again
“Need exactly one argument..password1.No, %s is not correct…Yes, %s is correct!”

BUT password1 doesnt work this time! So I could find more about strings storage in exe, but looking at the hex and it rewritten to words

00002400   4E 65 65 64 20 65 78 61 63 74 6C 79 20 6F 6E 65  Need exactly one

00002410   20 61 72 67 75 6D 65 6E 74 2E 00 70 61 73 73 77   argument..passw

00002420   6F 72 64 31 00 4E 6F 2C 20 25 73 20 69 73 20 6E  ord1.No, %s is n

00002430   6F 74 20 63 6F 72 72 65 63 74 2E 0A 00 59 65 73  ot correct…Yes

00002440   2C 20 25 73 20 69 73 20 63 6F 72 72 65 63 74 21  , %s is correct!

I guess I can calculate/compare hex numbers and letters/symbols and find out what %s refers to and find the address of it (the address is always written at the very left).

Looking at the last line, it seems 2C is a comma (and it is used before and again seems it is 2C), then 20 would be %… but 20 is used 3 times on 3rd line and only one %, huh. Lemme check the line in more detail
6F – o
72 – r
64 – d
31 – 1
00 – .
4E – N
6F – o
2C – ,
20 – (space)
25 – %

Ahh, so 25 will be % sign, i did not notice the space in the wordpad (in notepad++ i can now clearly see it lol). So %s is 25 73 here. I am not sure it refers to the memory of the given string though, or to some comparision, or just showing part of the code and translating it to hex numbers, or something totally else.

Part of the hex containing address 2573
00002570   54 68 65 20 72 65 73 75 6C 74 20 69 73 20 74 6F  The result is to

00002580   6F 20 73 6D 61 6C 6C 20 74 6F 20 62 65 20 72 65  o small to be re

00002590   70 72 65 73 65 6E 74 65 64 20 28 55 4E 44 45 52  presented (UNDER

000025A0   46 4C 4F 57 29 00 55 6E 6B 6E 6F 77 6E 20 65 72  FLOW).Unknown er

000025B0   72 6F 72 00 00 00 00 00 5F 6D 61 74 68 65 72 72  ror….._matherr

000025C0   28 29 3A 20 25 73 20 69 6E 20 25 73 28 25 67 2C  (): %s in %s(%g,

000025D0   20 25 67 29 20 20 28 72 65 74 76 61 6C 3D 25 67   %g)  (retval=%g

000025E0   29 0A 00 00 E8 D5 FF FF 9C D5 FF FF 34 D5 FF FF  )…èÕ..œÕ..4Õ..

I have literally zero idea about why is here the text about “The result…”. The exact byte on 2573 is 20, which is just space, so it seems this is not the way. No idea about the %s in %s(%g,%g)  (retval=%g), not even sure what %g is for (placeholder for some datatype, as %s is for strings and %d for ints?)

I will look more into the hex and check if something looks like code or strings.

This is interesting
00005200   92 26 00 00 05 00 01 08 00 00 00 00 3A 47 4E 55  ’&……….:GNU

00005210   20 43 39 39 20 31 34 2E 32 2E 30 20 2D 6D 36 34   C99 14.2.0 -m64

00005220   20 2D 6D 61 73 6D 3D 61 74 74 20 2D 6D 74 75 6E   -masm=att -mtun

00005230   65 3D 67 65 6E 65 72 69 63 20 2D 6D 61 72 63 68  e=generic -march

00005240   3D 6E 6F 63 6F 6E 61 20 2D 67 20 2D 4F 32 20 2D  =nocona -g -O2 –

00005250   73 74 64 3D 67 6E 75 39 39 00 0C 18 00 00 00 00  std=gnu99…….

00005260   00 00 00 00 10 00 40 01 00 00 00 05 04 00 00 00  ……@………

00005270   00 00 00 00 00 00 00 07 01 06 63 68 61 72 00 24  ……….char.$

00005280   77 00 00 00 0A 73 69 7A 65 5F 74 00 04 23 2C 93  w….size_t..#,“

00005290   00 00 00 07 08 07 6C 6F 6E 67 20 6C 6F 6E 67 20  ……long long

000052A0   75 6E 73 69 67 6E 65 64 20 69 6E 74 00 07 08 05  unsigned int….

000052B0   6C 6F 6E 67 20 6C 6F 6E 67 20 69 6E 74 00 0A 75  long long int..u

000052C0   69 6E 74 70 74 72 5F 74 00 04 4B 2C 93 00 00 00  intptr_t..K,“…

000052D0   0A 77 63 68 61 72 5F 74 00 04 62 18 E5 00 00 00  .wchar_t..b.å…

000052E0   24 D0 00 00 00 07 02 07 73 68 6F 72 74 20 75 6E  $Ð……short un

000052F0   73 69 67 6E 65 64 20 69 6E 74 00 07 04 05 69 6E  signed int….in

00005300   74 00 07 04 05 6C 6F 6E 67 20 69 6E 74 00 05 77  t….long int..w

00005310   00 00 00 05 FB 00 00 00 07 04 07 75 6E 73 69 67  ….û……unsig

00005320   6E 65 64 20 69 6E 74 00 07 04 07 6C 6F 6E 67 20  ned int….long

00005330   75 6E 73 69 67 6E 65 64 20 69 6E 74 00 07 01 08  unsigned int….

00005340   75 6E 73 69 67 6E 65 64 20 63 68 61 72 00 05 53  unsigned char..S

I hoped after “masm=att” (which tells us what assembler is being used) i will see some code in assembly, but there are only data types (I guess it could be from some included header).

I quickly scrolled through all the 8500 lines, but didnt see anything interesting. Searching for “mov” (assembly keyword) did not help.

I know that at the beginning is lots of things defined and even addresses written (for example for where is the code stored), but there is almost nothing in text, there is only for example PE
50 45 00 00 64 86 14 00 6A FB B4 67 00 84 01 00            PE..d†..jû´g.„..

00000090   D0 06 00 00 F0 00 26 00 0B 02 02 2B 00 1C 00 00  Ð…ð.&….+….

000000A0   00 46 00 00 00 02 00 00 E0 13 00 00 00 10 00 00  .F……à…….

000000B0   00 00 00 40 01 00 00 00 00 10 00 00 00 02 00 00  …@…………

000000C0   04 00 00 00 00 00 00 00 05 00 02 00 00 00 00 00  …………….

000000D0   00 60 02 00 00 06 00 00 68 47 02 00 03 00 60 01  .`……hG….`.

000000E0   00 00 20 00 00 00 00 00 00 10 00 00 00 00 00 00  .. ………….

and then one has to know what the bytes mean (for example 64 86 is actually 86 64 and stands for the architecture, ie it is telling me the exe is for 64bit operation system).

Okay, if the code is obfuscated or something, I think I need to learn where to find strings/code, so I try to google it or ask chatgpt.

So it seems in the section .text (which is written on the right where begins, so I can find it ez), there are bytes for
.
t
e
x
t
then few zeroes
then four bytes for something, four bytes again, four bytes, and then finally four bytes for address for the code itself.

00000180   00 00 00 00 00 00 00 00 2E 74 65 78 74 00 00 00  ………text…

00000190   28 1A 00 00 00 10 00 00 00 1C 00 00 00 06 00 00  (……………

000001A0   00 00 00 00 00 00 00 00 00 00 00 00 60 00 00 60  …………`..

So it seems the address for code is 00 06 00 00, but it is stored in so called little endian format, so it is 0+6*100+0*1000+0*10000 (all numbers in hexa) = 600

Oh welp, it seems like the code indeed begins at 600, but for every assembly instruction there is a hex number. So it is not just commands rewritten to ascii, so there are no words

00000600   C3 66 66 2E 0F 1F 84 00 00 00 00 00 0F 1F 40 00  Ãff…„…….@.

00000610   48 83 EC 28 48 8B 05 35 34 00 00 31 C9 C7 00 01  Hƒì(H‹.54..1ÉÇ..

00000620   00 00 00 48 8B 05 36 34 00 00 C7 00 01 00 00 00  …H‹.64..Ç…..

00000630   48 8B 05 39 34 00 00 C7 00 01 00 00 00 48 8B 05  H‹.94..Ç…..H‹.

00000640   9C 33 00 00 66 81 38 4D 5A 75 0F 48 63 50 3C 48  œ3..f8MZu.HcP<H

00000650   01 D0 81 38 50 45 00 00 74 66 48 8B 05 DF 33 00  .Ё8PE..tfH‹.ß3.

00000660   00 89 0D A5 5F 00 00 8B 00 85 C0 74 43 B9 02 00  .‰.¥_..‹.…ÀtC¹..

00000670   00 00 E8 A9 18 00 00 E8 34 18 00 00 48 8B 15 8D  ..è©…è4…H‹.

00000680   34 00 00 8B 12 89 10 E8 1C 18 00 00 48 8B 15 5D  4..‹.‰.è….H‹.]

00000690   34 00 00 8B 12 89 10 E8 84 05 00 00 48 8B 05 1D  4..‹.‰.è„…H‹..

000006A0   33 00 00 83 38 01 74 50 31 C0 48 83 C4 28 C3 90  3..ƒ8.tP1ÀHƒÄ(Ð

000006B0   B9 01 00 00 00 E8 66 18 00 00 EB BB 0F 1F 40 00  ¹….èf…ë»..@.

000006C0   0F B7 50 18 66 81 FA 0B 01 74 45 66 81 FA 0B 02  .·P.fú..tEfú..

So either I can go google what the relevant numbers mean and assemble (hehe) an assembly code. Or try more to look for the strings. I will begin with the strings.

It seems most often I should look at the .rdata

000001D0: [ Byte offsets relative to the start of this header ] Bytes 0x00-0x07: 2E 72 64 61 74 61 00 00 => “.rdata” (the section name) Bytes 0x08-0x0B: 50 0B 00 00 => VirtualSize (0xB50) Bytes 0x0C-0x0F: 00 40 00 00 => VirtualAddress (0x4000) Bytes 0x10-0x13: 00 0C 00 00 => SizeOfRawData (0xC00) Bytes 0x14-0x17: 00 24 00 00 => PointerToRawData

uld
000001D0   00 00 00 00 40 00 00 C0 2E 72 64 61 74 61 00 00  ….@..À.rdata..

000001E0   50 0B 00 00 00 40 00 00 00 0C 00 00 00 24 00 00  P….@…….$..

000001F0   00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40  …………@..@

00000200   2E 70 64 61 74 61 00 00 4C 02 00 00 00 50 00 00  .
so 2400
And that took me back where i began -__-

00002400   4E 65 65 64 20 65 78 61 63 74 6C 79 20 6F 6E 65  Need exactly one

00002410   20 61 72 67 75 6D 65 6E 74 2E 00 70 61 73 73 77   argument..passw

00002420   6F 72 64 31 00 4E 6F 2C 20 25 73 20 69 73 20 6E  ord1.No, %s is n

00002430   6F 74 20 63 6F 72 72 65 63 74 2E 0A 00 59 65 73  ot correct…Yes

00002440   2C 20 25 73 20 69 73 20 63 6F 72 72 65 63 74 21  , %s is correct!

00002450   0A 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  …………….

00002460   50 16 00 40 01 00 00 00 00 00 00 00 00 00 00 00  P..@…………

00002470   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  …………….

00002480   00 A0 00 40 01 00 00 00 08 A0 00 40 01 00 00 00  . .@….. .@….

00002490   6C 70 00 40 01 00 00 00 38 90 00 40 01 00 00 00  lp.@….8.@….

I think I will have to try the code. I googled %g and I found it is either for float or for scientific notation.

I guess I could try to check what the  “%s in %s(%g,%g)  (retval=%g)” is for. Seems like it is in some printf, so probably not helpful either. So either googling for the numbers for the assembly instructions or trying to understand more how string references work.

So I decided to check the code. To be honest it would be best to just write a parser that checks through this. The problem of course is, I have no idea how to use powershell to do anything even remotely similar. So I will play with that.

This is syntax from help
    Format-Hex [-Path] <string[]>  [<CommonParameters>]

    Format-Hex -LiteralPath <string[]>  [<CommonParameters>]

    Format-Hex -InputObject <Object> [-Encoding {Ascii | UTF32 | UTF7 | UTF8 | BigEndianUnicode | Unicode}] [-Raw]  [<C

    ommonParameters>]

Unfortunately I still have not much idea what it means, how to use the string argument. Something like “fhx .\crackme02.exe “a”” produces:
 Format-Hex : A positional parameter cannot be found that accepts argument ‘a’.

At line:1 char:1

+ fhx .\crackme02.exe “a”

+ ~~~~~~~~~~~~~~~~~~~~~~~

    + CategoryInfo          : InvalidArgument: (:) [Format-Hex], ParameterBindingException

    + FullyQualifiedErrorId : PositionalParameterNotFound,Format-Hex

The “a” is problematic. The thing I would need right now is to find a substring I choose. I know one can write whole programs in powershell, but no idea if I can discover it myself.

After a small thought I decided I want to google how to write scripts/code from powershell. Okay so, powershell runs files with extension ps1. Also looked for command to print out first 100 bytes, which is
Get-Content -Path .\file.exe -Encoding Byte | Select-Object -First 100 | Format-Hex


Well that was lots of googling (given the constraint this should be a rly hard challenge :D), so lets see what I can find out with help command. I can find out I will kill myself if I wont discover how the arguments work, there is again like 948398498 of those and idk how to use them. I see alias is “cat”, I will be using that. If I do “cat crackme02.exe”, it prints out the hex contents, but not hex numbers, rather the symbols, so lots of unreadable stuff and sometimes readable string. So I am not sure why to use it in the longer command, if I could use Format-Hex, will try.

Then there is -Path .\file.exe, so i suppose there I just write path to my file and then file. Also I suppose I can skip path if I am running powershell from the folder the exe is in (worked like that for fhx).

-Encoding Byte is almost surely for writing the hex numbers for the hex numbers, I suppose I could do “cat crackme02.exe -Encoding Byte”. And yes, it works, writes the numbers in decimal though. I suppose the Format-Hex at the end makes it into hex. Yea, cat crackme02.exe -Encoding Byte | Format-Hex just does the same as fhx crackme02.exe. I don’t understand much the | operator.


Hm, when I write only |, it writes >> at the beginning of the line, “pipe”. Example
>> f

At line:1 char:1

+ |

+ ~

An empty pipe element is not allowed.

    + CategoryInfo          : ParserError: (:) [], ParentContainsErrorRecordException

+ FullyQualifiedErrorId : EmptyPipeElement

Oh i think I can pipe commands to other commands. So this Get-Content -Path .\file.exe -Encoding Byte | Select-Object -First 100 would be taking the get-content command and passing it to select-object, in other words would be something like, if we wrote it as composing of functions: Select-Object – First 100 (Get-Content …)

Reverse engineering challenge – part one

I began a challenge for myself and I want to write about it. I’m documenting this challenge for my own reference, and I hope it might also inspire someone else. I want to try to use only PowerShell on Windows for reverse engineering while googling as least as possible (maybe except for exe “anatomy”, since I do not remember it much and trying to piece it together from examples would be extreme). I however remember some stuff and will use whatever I remember. 

I have found this repo https://github.com/NoraCodes/crackmes/tree/master

I compiled the crackme01.c with gcc (I of course did not look in the code) and will try to check only from powershell what are the hex contents. I tried to run it just by writing crackme01.exe, but that does not work. Luckily powershell advices how to run it – write .\ infront of, so I wrote .\crackme01.exe and it runs and says “Need exactly one argument.” And when I do for example  .\crackme01.exe abc, it says “No, abc is not correct.”. Okay, so we need to find out a string that is correct.

So i began playing with powershell commands. First of all I found out there is help for commands. I wrote “read” and was alt tabbing, but for some reason in powershell, there is only readelf (which would be for Linux). I suppose there is a command for Windows too, but probably begins with different word.

I found out that if I write “help XXX” and XXX doesnt exist, but is substring of any command, it will list the commands containing XXX as substring. But when I do help read, it does not show the readelf. Possibly bcs the whole name is “readelf.exe”, so it runs a program and is not command per se.

I tried “help file”, but cannot see any command that would be helpful. Also tried debug, or print. After a small thought, I tried “help hex” and found out there is a command with that name (actually I noticed later the name is format-hex with alias fhx). If you run it, it asks for path, so i just wrote name of the file (since i opened powershell in the folder with the exe) and it did really give me hex code!

I feel ecstatic, but the code is long and it cuts the top part after a while. I can see the hex numbers and if they have some counterparts in ASCII, I can read it as text right to these numbers. So sometimes there are some words, but most of it are random symbols.

Reading through the text that is right to it did not help me, so either it is not just about finding a string, or the string are not plain words, or I missed it.

First of all I need to find a way how to read the whole contents. I tried stopping powershell after he begins writing the contents, but no luck there. I need to find out where strings are stored in exe, so possibly I will need to google it.

Now I tried looking for how to save text from powershell to some text file. Help print, help text, help txt or help save do not seem they work.

After several minutes of thinking I tried help out. It found several things, but Out-File seems interesting, looking into it now.

“out-file crackme01.exe” nor “out-file abcd” do anything. The problem for me is that help out-file lists lots of arguments and I have no idea which one I have to use. When I copied whole path, like out-file C:\Users\Admin\Documents\ReverseEngineerDWRepo\crackmes-master\crackmes-master\exe
it says Access denied. I am not sure if I will need to need an access to do what I need, it is possible this command isnt the one I need.

I tried help access and a command, but feels a lot like wandering in dark, mainly when I dont know I need the out-file command. I will think for a while and maybe find some more and then maybe just google how to print out stuff to a text file.

Okay, I went back to the fhx cmd, if I did not miss anything, and Im confused af. I run it, input crackme01.exe, run it and it writes only first few bytes… namely first 16 numbers in hex? Exe should begin with hex numbers for M and Z in ascii. Huh?

Ahh, I cant even run the exe, I probably did something when I was playing with the out-file? Anyway, after recompiling it runs again. Also I noticed it isnt I saw first 16 numbers of the file, they are at the top of any file I put into fhx. So I saw only empty file.

But that does mean out-file works and really, I missed I created files in my folder. Unfortunately out-file abc.txt fhx crackme01.exe or out-file abc.txt crackme01.exe ds not work.

The syntax for out-file should be Out-File [-FilePath] <string> [[-Encoding]… (plus million of other arguments), but I cant seem to find out how to write the string.

 out-file abc.txt works,  out-file abc.txt XXX doesnt work. It is complaining about encoding argument, but that should be AFTER string argument. I think it is important to know what [] brackets mean and what <> brackets mean. If I try to do something out-file abc.txt <XXX>, it throws error about those <> brackets.

I tried help <>, and it threw error, BUT said “Missing file specification after redirection operator”. SOO it could mean > or < is used to tell powershell where I want the text to be redirected to.

Huh, out-file abc.txt > “a” doesnt throw error, but creates (empty) files abc.txt and a.
OH! I tried help > abc.txt and it wrote the contents to abc.txt!

I tried fhx crackme01.exe > hex.txt AND IT WORKS LESGO

Okay, so I finally have the hex contents. After some time it would be best to parse it, so I can just write a command and it will show me the header, .data section etc. But that is for much later.

Looking at the hex, I see parts of code, for example
“Need exactly one argument..password1.No, %s is not correct…Yes, %s is correct!”

%s is placeholder for string. So first of all I will try just running it with “password1”. AND IT WORKS!!!

So here we were lucky, because the “password1” was stored in the string that stood out a lot. Why, I dont know, because there could be only the %s IMO. Let’s see the next one.