Hacking Series Part 21

Challenge: PowerFul_Crackme

Category: reverse engineering

We are given an ELF named “PowerFul_Crackme”. After opening it in IDA, you see that the program enters in main and prints “The magic string: ” with printf.

It then goes on to initialize a counter at loc_11B3 from 0–9, which is stored in var_4. If the counter is below 9, scanf is called and the…

some chaos for you

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Managing cross-project releases in Atlassian Jira


Websockets in python

Contact Management System In C Language

Use Molecule & Gitlab-CI to Automate Testing of Ansible Roles

Building your game for the Web

Working with API

Web Applications Client-side State Management

Programming wallpaper image

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


some chaos for you

More from Medium

TryHackMe —Active Reconnaissance Walkthrough

Hack The Box — Active Walkthrough

Vulnhub: Mr Robot (Walkthrough)

Previse Writeup — HackTheBox