Skip to content

Commit c684219

Browse files
authored
Merge pull request #49 from valenter/master
Added damagedsoc writeup
2 parents 9d5d175 + 09536c2 commit c684219

1 file changed

Lines changed: 54 additions & 3 deletions

File tree

  • content/posts/uiuctf25-damagedsoc

content/posts/uiuctf25-damagedsoc/index.md

Lines changed: 54 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ Like many modern reverse engineering challenges, this step won't be as easy as t
9898

9999
![idaSOC](/uiuctf2025/damaged-soc/screenshot-1.png)
100100

101-
##### Enter `sus.py`, courtesy of my teammate [@nect](https://theromanxpl0.it/members/nect/)
101+
**Enter `sus.py`, courtesy of my teammate [@nect](https://theromanxpl0.it/members/nect/)**
102102

103103
```python
104104
f = open('memory.mem')
@@ -577,7 +577,7 @@ result = find_key_bytes()
577577
`Bytes 16-23: 70736c3076657223 = 'psl0ver#'`
578578
`Bytes 24-27: 30643030 = '0d00'`
579579

580-
**`flag = uiuctf{U_Uctf_m1psl0ver#0d00._abcdefghi}
580+
**`flag = uiuctf{U_Uctf_m1psl0ver#0d00._abcdefghi}`**
581581

582582
Now, if everything is correct, we should be able to patch our memory.mem file and see `\n===verification passed!===\n` printed in the output.
583583

@@ -722,7 +722,58 @@ if __name__ == "__main__":
722722
During our first approach to the challenge, [simonedimaria](https://theromanxpl0.it/members/simonedimaria/) managed to recompile the source files with debugging logs:
723723

724724
```
725-
Interrupe Handler Address: 0000000008000040 ---- Damaged region dump ---- mem[8] = ef mem[9] = bf mem[a] = bd mem[b] = ef mem[c] = bf mem[d] = bd mem[e] = ef mem[f] = bf mem[10] = bd mem[11] = ef mem[12] = bf mem[13] = bd mem[14] = ef mem[15] = bf mem[16] = bd mem[17] = ef mem[18] = bf mem[19] = bd mem[1a] = ef mem[1b] = bf mem[1c] = bd mem[1d] = ef mem[1e] = bf mem[1f] = bd mem[20] = ef mem[21] = bf mem[22] = bd mem[23] = ef mem[24] = bf mem[25] = bd mem[26] = ef mem[27] = bf mem[28] = bd mem[29] = ef mem[2a] = bf mem[2b] = bd mem[2c] = ef mem[2d] = bf mem[2e] = 7d ----------------------------- PC=0x000000000000010c, inst=0x24190148, rs_data(t0)=0x0000000000000000, rt_data(i)=0x0000000000000000 writeback regnum = 29, data = 0000000000000d00 PC=0x0000000000000110, inst=0x03200009, rs_data(t0)=0x0000000000000000, rt_data(i)=0x0000000000000000 writeback regnum = 28, data = 0000000000000af0 PC=0x0000000000000114, inst=0x00000000, rs_data(t0)=0x0000000000000000, rt_data(i)=0x0000000000000000 writeback regnum = 31, data = 0000000000000d00 writeback regnum = 25, data = 0000000000000148 write addr: 0000000000000cf8, data: 0000000000000d00, type: 4 writeback regnum = 29, data = 0000000000000c90 writeback regnum = 2, data = 000000000000000
725+
Interrupe Handler Address: 0000000008000040
726+
---- Damaged region dump ----
727+
mem[8] = ef
728+
mem[9] = bf
729+
mem[a] = bd
730+
mem[b] = ef
731+
mem[c] = bf
732+
mem[d] = bd
733+
mem[e] = ef
734+
mem[f] = bf
735+
mem[10] = bd
736+
mem[11] = ef
737+
mem[12] = bf
738+
mem[13] = bd
739+
mem[14] = ef
740+
mem[15] = bf
741+
mem[16] = bd
742+
mem[17] = ef
743+
mem[18] = bf
744+
mem[19] = bd
745+
mem[1a] = ef
746+
mem[1b] = bf
747+
mem[1c] = bd
748+
mem[1d] = ef
749+
mem[1e] = bf
750+
mem[1f] = bd
751+
mem[20] = ef
752+
mem[21] = bf
753+
mem[22] = bd
754+
mem[23] = ef
755+
mem[24] = bf
756+
mem[25] = bd
757+
mem[26] = ef
758+
mem[27] = bf
759+
mem[28] = bd
760+
mem[29] = ef
761+
mem[2a] = bf
762+
mem[2b] = bd
763+
mem[2c] = ef
764+
mem[2d] = bf
765+
mem[2e] = 7d
766+
-----------------------------
767+
PC=0x000000000000010c, inst=0x24190148, rs_data(t0)=0x0000000000000000, rt_data(i)=0x0000000000000000
768+
writeback regnum = 29, data = 0000000000000d00
769+
PC=0x0000000000000110, inst=0x03200009, rs_data(t0)=0x0000000000000000, rt_data(i)=0x0000000000000000
770+
writeback regnum = 28, data = 0000000000000af0
771+
PC=0x0000000000000114, inst=0x00000000, rs_data(t0)=0x0000000000000000, rt_data(i)=0x0000000000000000
772+
writeback regnum = 31, data = 0000000000000d00
773+
writeback regnum = 25, data = 0000000000000148
774+
write addr: 0000000000000cf8, data: 0000000000000d00, type: 4
775+
writeback regnum = 29, data = 0000000000000c90
776+
writeback regnum = 2, data = 0000000000000000
726777
...
727778
```
728779

0 commit comments

Comments
 (0)