Skip to content
logo
Red team
ELF x86 ptrace
  • Green team
  • Blue team
  • Purple team
  • Ty Myrddin
Initializing search
      • IN: Where the falcons and foxes roam
      • THROUGH: Where the raccoons burrow and rummage
        • The art of staying where you are not wanted
        • Where the raccoon overflows the bin—on purpose
        • Foraging for secrets in binaries
          • Binary formats
          • Cracking nuts
          • Malware analysis
          • Reverse engineering training grounds
            • THM Rooms
            • Root me challenges
              • ELF x86 0 protection
              • ELF x86 basic
              • PE x86 0 protection
              • ELF C++ 0 protection
              • Godot 0 protection
              • PE x86 0 protection
              • ELF MIPS basic crackme
              • ELF x64 golang basic
              • ELF x86 fake instructions
              • ELF x86 ptrace
                • Resources
              • Godot bytecode
              • WASM introduction
              • ELF ARM basic crackme
              • Godot mono
              • PYC bytecode
              • ELF x86 no software breakpoints
              • ELF ARM crackme 1337
              • ELF x86 crackpass
              • ELF x86 exploitme
              • ELF x86 random crackme
              • GB basic Game Boy crackme
              • APK anti-debug
            • Malware traffic analysis exercises
            • theZoo - A Live Malware Repository
            • crackmes.one
          • Malware traffic analysis exercises
          • theZoo - A Live Malware Repository
          • crackmes.one
        • The payload is in the picnic photo
        • Tipping the stack—and the garbage can
        • Nature’s cheats: The raccoon’s guide to slipping through the cracks
      • OUT: Where squirrels swipe the crown jewels
    • Resources

    ELF x86 ptrace¶

    Root-me challenge: Compiled with GCC32 4.3.4 on linux gentoo.


    1. Use, for example, Ghidra.

    2. Search for main() in Functions.

    3. Analysis (in Decompiler):

    (local_1e == local_14[4]) &&
    (local_1d == local_14[5])) &&
    (local_1c == local_14[1])) &&
    (local_1b == local_14[10]))
    puts("\nGood password !!!\n");
    

    Resources¶

    • The GNU binary utils

    • Ptrace - process trace

    • SSTIC 06 - Playing with ptrace


    Last update: 2025-05-12 14:16
    Back to top
    Previous ELF x86 fake instructions
    Next Godot bytecode
    © Copyright 2025, TyMyrddin.
    Created using Sphinx 7.2.6. and Sphinx-Immaterial

    Made with love in the Unseen University, 2025, with a forest garden fostered by /ut7