HackTheBox Questionnaire Writeup
Explore the basics of cybersecurity in the Questionnaire Challenge on Hack The Box. This very-easy-level Challenge introduces encryption reversal and file handling concepts in a clear and accessible way, perfect for beginners.
Is this a ‘32-bit’ or ‘64-bit’ ELF? (e.g. 1337-bit)
64-bit
What’s the linking of the binary? (e.g. static, dynamic)
dynamic
Is the binary ‘stripped’ or ‘not stripped’?
not stripped
Which protections are enabled (Canary, NX, PIE, Fortify)?
NX
What is the name of the custom function the gets called inside main()
? (e.g. vulnerable_function())
vuln
What is the size of the ‘buffer’ (in hex or decimal)?
0x20
Which custom function is never called? (e.g. vuln())
gg
What is the name of the standard function that could trigger a Buffer Overflow? (e.g. fprintf())
fgets
Insert 30, then 39, then 40 ‘A’s in the program and see the output. After how many bytes a Segmentation Fault occurs (in hex or decimal)?
40
What is the address of ‘gg()’ in hex? (e.g. 0x401337)
0x401176
This post is licensed under CC BY 4.0 by the author.