Suninatas Game 09
challenges
Game 09
Challenge: Reverse engineering a Windows executable
Step 1: Extract Archive
1 | 7z x SuNiNaTaS.zip |
Step 2: Identify File
1 | file Project1.exe |
Output:
PE32 executable for MS Windows 4.00 (GUI), Intel i386, 8 sections
Step 3: Analyze with IDA
Run the executable in a virtual environment (Windows 10, VirtualBox).
The program displays an input box with two buttons.
Use IDA Pro and press Shift+F12 to view strings. Look for the “Congratulation!” message, then double-click to find cross-references.
Step 4: Find Password
From IDA disassembly:
1 | CODE:00450388 ; --------------------------------------------------------------------------- |