Skip to main content

Tag: X86-64

0x00 - easy_reverse by cbm-hackers

This is a beginner-friendly crackme by cbm-hackers which you can find here and here.

binary rev50_linux64-bit
sha256 bb28a152966bed0a369f30149a912982ea33b408794bfbd82e73c87ff4e184ff

Running file reveals that this is a 64-bit ELF, and that it is not stripped which means it still contains symbols and debugging info.

file rev50_linux64-bit
rev50_linux64-bit: ELF 64-bit LSB pie executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 3.2.0, BuildID[sha1]=6db637ef1b479f1b821f45dfe2960e37880df4fe, not stripped

We can use readelf to confirm that it is not stripped, as the symbol table still exists: