Suninatas Game 10
challenges
Game 10
Challenge: Reverse engineering a .NET Windows executable
Step 1: Extract and Identify
1 | 7z x reversing.zip |
Output:
PE32 executable for MS Windows 4.00 (GUI), Intel i386 Mono/.Net assembly, 3 sections
Step 2: Hex Analysis
From hex view, strings are readable in Unicode format:
1 | 2theT@P, Authkey: Did U use the Peid?, SuNiNaTaS, Try again!, explorer, http://suninatas.com, textBox1, button1, OK, label2, Made by 2theT0P, button2, QUIT, Form1, WindowsFormsApplication1, Properties, Resources |
The program is based on WinForms.
Step 3: Decompile with dnSpyEx
Use dnSpyEx (run in Windows) and drag the file to decompile.
Decompiled Code
1 | // WindowsFormsApplication1.Form1 |