Reverse Engineering
Challenge
Link
Star (201 pts)
Description
nc star.nc.jctf.pro 1337Solution
void __fastcall __noreturn main(int a1, char **a2, char **a3)
{
__int64 v3; // rsi
void (__fastcall ***v4)(_QWORD); // rax
char v5[8]; // [rsp+8h] [rbp-B0h] BYREF
char v6[8]; // [rsp+10h] [rbp-A8h] BYREF
char v7[8]; // [rsp+18h] [rbp-A0h] BYREF
char v8[8]; // [rsp+20h] [rbp-98h] BYREF
char v9[8]; // [rsp+28h] [rbp-90h] BYREF
char v10[8]; // [rsp+30h] [rbp-88h] BYREF
char v11[8]; // [rsp+38h] [rbp-80h] BYREF
char v12[8]; // [rsp+40h] [rbp-78h] BYREF
__int64 (__fastcall **v13)(); // [rsp+48h] [rbp-70h] BYREF
char v14[8]; // [rsp+50h] [rbp-68h] BYREF
char v15[8]; // [rsp+58h] [rbp-60h] BYREF
char v16[8]; // [rsp+60h] [rbp-58h] BYREF
char v17[8]; // [rsp+68h] [rbp-50h] BYREF
char v18[8]; // [rsp+70h] [rbp-48h] BYREF
char v19[8]; // [rsp+78h] [rbp-40h] BYREF
char v20[8]; // [rsp+80h] [rbp-38h] BYREF
char v21[8]; // [rsp+88h] [rbp-30h] BYREF
char v22[8]; // [rsp+90h] [rbp-28h] BYREF
unsigned __int64 v23; // [rsp+98h] [rbp-20h]
v23 = __readfsqword(0x28u);
sub_555555559840();
sub_55555555E300(v5);
sub_55555555F2F0(v14, v5);
sub_55555555F2C0(v5);
sub_55555555E440(v6);
sub_55555555F3C0(v15, v6);
sub_55555555F390(v6);
sub_55555555E580(v7);
sub_55555555F490(v16, v7);
sub_55555555F460(v7);
sub_55555555E6C0(v8);
sub_55555555F560(v17, v8);
sub_55555555F530(v8);
sub_55555555E800(v9);
sub_55555555F630(v18, v9);
sub_55555555F600(v9);
sub_55555555E940(v10);
sub_55555555F700(v19, v10);
sub_55555555F6D0(v10);
sub_55555555EA80(v11);
sub_55555555F7D0(v20, v11);
sub_55555555F7A0(v11);
sub_55555555EBC0(v12);
sub_55555555F8A0(v21, v12);
sub_55555555F870(v12);
sub_55555555EA80(&v13);
sub_55555555F7D0(v22, &v13);
sub_55555555F7A0(&v13);
while ( 1 )
{
v13 = off_555555566978;
sub_55555555D250();
v3 = (unsigned int)choose_menu();
sub_55555555AED0((__int64)v14, v3);
v4 = (void (__fastcall ***)(_QWORD))sub_55555555FA20();
(**v4)(v4);
}
}








Just TV (326 pts)
Description
Solution










Cursed Protocol (500 pts)
Description
Solution
Last updated