Log in

View Full Version : Panda Reversing Challenge


wtbw
July 4th, 2009, 05:18
http://pandalabs.pandasecurity.com/archive/Panda-Challenge.aspx ("http://pandalabs.pandasecurity.com/archive/Panda-Challenge.aspx")

A level each week for three weeks, starting on Tuesday.

Could be fun

OHPen
July 6th, 2009, 07:05
Lets see what they provide

Regards,
OHPen

Silkut
July 7th, 2009, 05:50
First challenge has been released: http://pandalabs.pandasecurity.com/archive/Panda-Challenge-_2D00_-_2200_All-that-glitters-is-not-gold_2200_.aspx

EDIT: As well as first answers it seems.

arc_
July 7th, 2009, 07:18
That was pretty easy . Let's see what the next one is.

dion
July 7th, 2009, 11:37
don't really got that. stuck upon ...the key for second stage??

evaluator
July 7th, 2009, 13:37
inside JPG @070

harder Question: where to put PWD?! 0:

evaluator
July 7th, 2009, 14:08
okey, i get:

Code:
Congratulations!!

You reached the end of this crackme.

The secret message is " "

Panda Security AMR Team 2009


Don Wooma, i ready to sell secret message! just 5$ for you 0:

PS. discount! 4,99$

tofu-sensei
July 7th, 2009, 15:09
i'm surprised it took you that long, evaluator

dion
July 7th, 2009, 23:02
just realized how to execute LFN exe in dos

evaluator
July 8th, 2009, 06:06
i made BAT file.

OHPen
July 14th, 2009, 01:58
First challenge was kind of bullshiting. Has not much to do with reverse engineering...

Is the second challenge already released ?

Regards,
OHPen

wtbw
July 14th, 2009, 02:16
Second challenge should be out sometime in the next few hours, according to the PDF in the previous post and judging by last week's

evaluator
July 14th, 2009, 03:23
write here url

dion
July 14th, 2009, 08:15
http://pandalabs.pandasecurity.com/blogs/PandaLabs/2009/07/14/level.exe.patch.exe.zip

Dominator
July 14th, 2009, 15:18
Anyone could explain me how to "talk" to the panda program in C ?

I have the solution I guess, but I am unable to write the required program that talks to the console application

I feel stupid.

arc_
July 14th, 2009, 19:49
I sent you a PM, just to make sure not to spoil anything for the others . I completed reversing as well after a day, even though I spent most time trudging through what turned out to be the initialization of the runtime... Will write my program tomorrow.

evaluator
July 15th, 2009, 00:12
is interesting to play with it?

dion
July 15th, 2009, 01:04
is this really packed or a bogus? never played with encryptpe tho. if it was packed, why there is console API in the beginning and can see strings clearly?

arc_
July 15th, 2009, 05:57
evaluator: I'm having fun with this, yes. I didn't expect the type of challenge that the program contains. It even contains some of its own antidebug this time, although most of the protection is again in the (third party) packer.

dion: let's just say that as with most packers/protectors, EncryptPE can be used to selectively protect certain functions. You will know it when you see it.

evaluator
July 15th, 2009, 06:36
wow, unpacking need!? =)

arc_
July 15th, 2009, 07:41
It's not really encrypted at all. Just lots and lots of junk code inserted.

dion
July 15th, 2009, 09:55
well, it surely junking debugview. wierd, is it supposed to made it crash? but it didn't

arc_
July 15th, 2009, 14:12
That is anti-Olly. Those huge format strings exploit a bug in Ollydbg to make it crash, it's a very common trick. Correspondingly there are also many options available for fixing it.

wtbw
July 20th, 2009, 07:14
Second?! Argh. Must try harder tomorrow

dion
July 21st, 2009, 08:30
the hard one... looks a bit 'malicious'. it peeks my boot sector and hash them. still stuck on it tho.

arc_
July 21st, 2009, 10:26
I'm pretty stumped on this one as well. If the message is not inside the program as the challenge description states, then where is it? They can't really make assumptions about specific other files with specific contents existing on the drive... Even ntdlr probably changes between Windows versions

Reversing the hashes is pretty hopeless as well, considering the length of the input data (255 bytes most times)...

dion
July 21st, 2009, 10:30
from what said, it is closer to you than it seems, i took liberty to point 'it' to the panda file itself. dunno, it runs 2 times, watched in filemon, and nothing more... maybe overflowed inside

xwings
July 23rd, 2009, 01:12
Quote:
[Originally Posted by dion;81980]from what said, it is closer to you than it seems, i took liberty to point 'it' to the panda file itself. dunno, it runs 2 times, watched in filemon, and nothing more... maybe overflowed inside


saw alots of fork() there. my wild guess could be overflowed. well. i got no idea how it works.