This is my first ever walkthrough of a reverse challenge, and the second RE challenge on Hack The Box that I’ve completed so far. I’m really excited to share how I solved this challenge, and I hope to help others who get stuck (as I did, many, many times).
Try to run the program in the terminal, just to see what it does. The first things I noticed about the program is that it prints “EXATLON_V1” as a large banner that takes, for what feels like forever, to print itself before prompting the user to enter a password.
I enter various combinations of numbers, letters and symbols of different lengths to see if the program reacts differently. It appears to accept any input, except for the letter “q,” which exits the program
Next, I open the program in IDA64(free version), but everything appears to be unreadable. Open exatlon_v1 in DIE (Detect It Easy) to see what’s going on in there.
I can see that it’s been packed with UPX, and I proceed to unpack it with the following command in the terminal:
upx -d exatlon_v1 -o exatlon_v1_unpacked
Now that the program is unpacked, I plug it into IDA64 to see what’s going on inside. Because I’ve already played around with the program, I have a general idea about what I will see inside: A call to multiple print functions, a function to check my input with a saved value, an exit call for when ‘q’ is entered, and a loop.
The first thing I look for in IDA is for the print function “[+] Enter Exatlon Password :”. I know that user input should come after that, as well as the call function for comparing the input.
We can clearly see where Exatlon prompts the user to enter the password, as well as a function at memory location 0x404D29 which seems to convert the input.
Additionally, I can see another variable at 0x54B4F0 holding what seems to be the encrypted correct password.
1152 1344 1056 1968 1728 816 1648 784 1584 816 1728 1520 1840 1664 784 1632 1856 1520 1728 816 1632 1856 1520 784 1760 1840 1824 816 1584 1856 784 1776 1760 528 528 2000
I am going to assume that each number corresponds to a letter, so the next move is to run Exatlon in GDB, and place a breakpoint after the call function of the program that converts the input (at 0x404D29). I run the program, and enter a single letter, “A”.
There are two registers that change according to my input: R8 and R10. At first, I spent time trying to see how the value stored in R8 corresponded to “1152” in our code, but I couldn’t find anything, and moved on to the next register, R10.
R10 holds the memory address of 0x7fffffffdbb4
0x30343031 is hex for the ASCII value of 1040 and holds four digits, just like our encrypted answer up top! I rerun the program, but this time entering “B”, which holds the value of 1056. It seems to be going up by intervals of 16. I repeat this process for lowercase letters and numbers, and symbols.
Instead of placing every possible letter, number, and symbol into Exatlon and examining the memory location value of the R10 register, I wrote a quick Python script to return the values to me in a text file.
Adding 16 does not work for symbols, so those have to be done manually. You don’t need to do all of them, remember, the password will be in this format:
I was able to fill out the vast majority of the password after running my script, but there was still some blank spots where the symbols go. I went back to Exatlon in GDB and make a couple educated guesses to find/confirm the most symbols needed to find the correct password!