Skip to content

Build it, Fu^H^H Break it, Fix it.

Part 2: Break it.

This is the second part of the BFF challenge.

This time around we are going to look at Breaking the code, that others have written.

Your task.

Your task for the next two weeks is to try to break into as many of the programs as you can.

For each program there will be two things to find:

  • The details used for Authentication (password or whatever)
  • The Secret Message

You can discuss the approaches you have in Aula using the tag #breakit I will try to provide hints as we go along.

You can find compiled version of the programs written in part 1 at TODO

Anything Goes

Depending on your approach you may want to edit the binary file to get the message. This is fine by me.

However if you do change the file so things are always true you may get the message, but not the password.

You may think of more interesting (non technical) approaches to get the data.

Submission

Submit a list of the programs you have broken. With details of the passwords and messages you have found. Give a quick (one sentence) overview of how you found the information.

Hints

To succeed in the challenge we are going to have to look inside compiled files.

There are lots of tools that can help us here. For example we might want to search the compiled files for strings that give us a clue to the password.

Have a look at this Tutorial for reverse engineering with GDB

Back to top