REplay: Reverse Engineering Playground
Ctrlk
SkyPenguin Labs
  • Introduction
    • What Is REplay?
    • Running The CTF - Know XYZ
    • Scenario
    • FaQ - Frequently Asked Questions
  • REplay
    • Levels
    • Writeups
      • Level 1 - All Walkthroughs
        • Find the unencrypted API key
        • Find the HTTP-BasicAuth formatted username and password
        • Find the CTF information block
        • Find the encrypted API key
        • Crack the first login system
        • Modify the variable of the hide menu functionality
        • Authentication Server Investigation
        • Security Systems In This CTF
        • Pseudocode representation of the login system
        • Find the integer based key used to compare the input license in the GUI.
        • Figure out where the pre-determined login statement is being made.
        • Find the hotkey that is used to exit the menu and kill the current process
        • Bypass entirely - login system
      • Level 2 - All Walkthroughs
      • Level 3 - All Walkthroughs
      • Level Exploits / Scripts
      • REplay - Exploring Further
      • REplay - Suggested Resources For RE
      • REplay - L1-3 Goal Pages
    • REplay - Extras
    • Finished!
Powered by GitBook
Page cover
On this page
  1. REplay
  2. Writeups

Level 1 - All Walkthroughs

Find the unencrypted API keyFind the HTTP-BasicAuth formatted username and passwordFind the CTF information blockFind the encrypted API keyCrack the first login systemModify the variable of the hide menu functionalityAuthentication Server InvestigationSecurity Systems In This CTFPseudocode representation of the login systemFind the integer based key used to compare the input license in the GUI.Figure out where the pre-determined login statement is being made.Find the hotkey that is used to exit the menu and kill the current processBypass entirely - login system
PreviousWriteupsNextFind the unencrypted API key

Last updated 1 year ago