Tags: ida 

Rating:

[All WriteUps for this CTF here](https://github.com/ipv6-feet-under/WriteUps-S.H.E.L.L.CTF21): https://github.com/ipv6-feet-under/WriteUps-S.H.E.L.L.CTF21
![S.H.E.L.L.CTF](https://raw.githubusercontent.com/ipv6-feet-under/WriteUps-S.H.E.L.L.CTF21/main/banner.png)

# check_flag

In this challenge we were given an executable to analyse.
After downloading the executable the first step was to open it up in IDA and looking for some hard coded passes or checks:

![check_flag](https://github.com/ipv6-feet-under/WriteUps-S.H.E.L.L.CTF21/blob/main/Reverse%20Engineering/check_flag/check_flag.png?raw=true)

Here we see the main function of the executable.
As we can see the flag is hard coded into the executable and we can submit the flag
```
SHELL{bas1c_r3v}
```

Original writeup (https://github.com/ipv6-feet-under/WriteUps-S.H.E.L.L.CTF21/tree/main/Reverse%20Engineering/check_flag).