Suninatas Game 11
challenges
Game 11
Challenge: Reverse engineering a Windows executable with string manipulation
Step 1: Identify File
1 | file Project1.exe |
Output:
PE32 executable for MS Windows 4.00 (GUI), Intel i386, 8 sections
Step 2: Extract Strings from Hex
From IDA disassembly, key strings:
1 | CODE:0045041C Congratulation! |
Step 3: Analyze Form Creation
In _TForm1_FormCreate, these strings are assigned to
variables at offsets:
1 | lea eax, [ebx+300h] |
All strings are concatenated in order:
1 | push dword ptr [ebx+300h] |
Result:
2abbe4b681aae92244536ca0e32fa0de
Alternative: Decompiled Code Analysis
1 | int __fastcall TForm1_Button1Click(int a1) |
The strings are rearranged in the concatenation. Check assembly for the actual order.
Assembly Order
1 | push dword ptr [ebx+310h] ; 2V |