diff --git a/writeups/reversing/Saint Rings/koodl/README.md b/writeups/reversing/Saint Rings/koodl/README.md new file mode 100644 index 0000000..92338e7 --- /dev/null +++ b/writeups/reversing/Saint Rings/koodl/README.md @@ -0,0 +1,17 @@ +# Saint Rings writeup + +Writeup Author: `gardc` + +## Analysis & solution + +Since this is a reversing challenge, we start by opening the binary in the reverser’s tool of choice. In this case, I’m using Binary Ninja. + +![binary ninja](sr1.png) + +Opening strings, we are instantly presented with the flag! `EPT{0n3_str1ng_t0_rul3_th3m_4ll}` + +## Alternative solution + +By simply using `strings` on the binary which is common when inspecting a binary, we can also find the flag. + +![strings command](sr2.png) diff --git a/writeups/reversing/Saint Rings/koodl/sr1.png b/writeups/reversing/Saint Rings/koodl/sr1.png new file mode 100644 index 0000000..141bd2f Binary files /dev/null and b/writeups/reversing/Saint Rings/koodl/sr1.png differ diff --git a/writeups/reversing/Saint Rings/koodl/sr2.png b/writeups/reversing/Saint Rings/koodl/sr2.png new file mode 100644 index 0000000..4788998 Binary files /dev/null and b/writeups/reversing/Saint Rings/koodl/sr2.png differ