Crack executable and files to win points
These challenges will help you understand the workings of compiled languages. Decompile these executables to get the assembler instructions for solving the problem.
Understands the assembly language (ASM).
Understands the different executable formats (ELF, PE, etc.).
Knows how to work with a disassembler / debugger.
|Results||Challenge's Name||Validations||Number of points||Difficulty||Author||Note||Solution|
|ELF - 0 protections||1523||5 Points||Very easy||g0uZ||1|
|ELF - Basic||1273||5 Points||Very easy||g0uZ||0|
|PE - 0 protections||371||5 Points||Very easy||alejandr0||0|
|ELF - Fake Instructions||377||15 Points||Easy||kmkz||0|
|ELF - Ptrace||374||15 Points||Easy||g0uZ||0|
|PYC - ByteCode||80||20 Points||Medium||Thanat0s||0|
|ELF - No software breakpoints||44||25 Points||Medium||yodzeb||0|
|ELF - ARM||59||30 Points||Medium||poney||0|
|ELF - CrackPass||242||30 Points||Medium||Tosh||0|
|ELF - ExploitMe||244||30 Points||Medium||kmkz||0|
|ELF - Random Crackme||194||30 Points||Medium||kmkz||0|
|ELF - Crypto ARM||16||35 Points||Medium||koma||0|
|PE - SEHVEH||29||35 Points||Medium||Thanat0s||0|
|APK - Anti-dbg||61||40 Points||Medium||cryptax||0|
|ELF - Debug||76||45 Points||Medium||Tosh||0|
|PE - AutoPE||44||45 Points||Medium||Gr4ph0s||0|
|ELF - KeygenMe||46||50 Points||Medium||int_0x80||0|
|ELF - Packed||26||70 Points||Hard||Tosh||0|
|ELF - VM||12||115 Points||Very hard||Thanat0s||0|
|houps||ELF - Basic||5 December 2013 at 19:47|
|viking||ELF - Basic||5 December 2013 at 19:20|
|viking||ELF - 0 protections||5 December 2013 at 19:17|
|Mainro||PE - 0 protections||5 December 2013 at 19:08|
|l3l3r0y3||ELF - ExploitMe||5 December 2013 at 14:52|
|sascha||ELF - Basic||5 December 2013 at 13:51|
|sascha||ELF - 0 protections||5 December 2013 at 13:47|
|j0n17||ELF - Basique||5 December 2013 at 13:43|
|j0n17||ELF - 0 protections||5 December 2013 at 13:40|
|erixsen||ELF - 0 protections||4 December 2013 at 21:20|
You can simply share the link to see your score in your profile
please add feature to share my score on social networks (fb,tw etc)
stor: it works for me. You have to be also connected with the same IP to the site to get access.
hardened binary ssh server (challenge03.root-me.org:2224) is down?
the CTF were down yes
That me or the CTF are down ?
The discussion goes on on the forum
i dont get it. i am using nslookup. but i cant to a zone transfer because of the security settings
find a tool to speak to a dns server
can someobe give me a hint fo network dns zone transfer challenge? i can connect to the dns server but ls -d ch11.... doesnt seem to work.
The App-Script Shell4 challenge has been changed. Those who already did it can do it again.
English forums for challenge are now open, and yes, challenge list are yet in same order as in french part.
Yeah, it looks like C&C-1 is a bit trickier than that. A good starting point are the related ressources.
You are welcome to post your challenge related questions on the forum so it can help out other people too.
Seriously don’t understand C&C level 1. I have literally tried every accepted foreign IP address that just talks to one computer on the network. Only problem is there are like none
The App-Script Shell5 challenge is down until tomorrow morning.
Hi.Im trying to root LAMP ctf6 and Im stuck here.Im in the machine but as an apache user..So I uploaded a local exploit, 8478.sh and run ./8478.sh 379 but the generated SUID file isnt owned by root,still apache..Where Im I going wrong?
section EN, main page, solutions: no challenge name!
The Root-Me.org team whishes a Merry Christmas to everyone !
New crypto challenge "Padding Oracle" released !
Go ! go !
test reload auto & close auto post edition
test chatbox en