Hacking Series Part 21

Challenge: PowerFul_Crackme

Category: reverse engineering

We are given an ELF named “PowerFul_Crackme”. After opening it in IDA, you see that the program enters in main and prints “The magic string: ” with printf.

It then goes on to initialize a counter at loc_11B3 from 0–9, which is stored in var_4. If the counter is below 9, scanf is called and the…




some chaos for you

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Jenkins vs GitLab: Core Differences

How to control Android long-running tasks in easy way

Introduction to Sheel — A Quick Guide -part 1

How to Resize a Video and Preserve Aspect Ratio in Java

Configuring Hadoop using Ansible….

JAMstack Development — All You Need to Know — InvoZone

Zenith | CEX Airdrop |

The History of IF

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


some chaos for you

More from Medium

Hack the Box — Mini Line

Denial of Service Dog: A DIY Guide.

Wonderland- Tryhackme CTF