ude-syssec-challenge/0000755000175000017500000000000013357403760013702 5ustar f0rkif0rkiude-syssec-challenge/challenge0000755000175000017500000001320413357403760015552 0ustar f0rkif0rkiELF(4$4 (pddd444  TTTpppppDDQtdRtd/lib/ld-linux-armhf.so.3GNUGNUg=P6de# ˛  xD!{|};/N=? & -libc.so.6signalputsabortmprotectptrace__libc_start_main__gmon_start__GLIBC_2.4ii N(  $@-[- ƏʌƏʌƏʌƏʌƏʌƏʌƏʌ|P@-0CPC@- 40 pp`\@-  Pp4\O OjFMHKnx0 0 R/@ (KA+@GpGAAqI@GpGA#x##p@ph@@+ИG P/@-~p\-CF NF MF~D}Dv $4U;JFAF8FGBѽv d pG@-usage: ./challenge That is correct. Now apply for the position! :) Be sure to mention the password.You need to look harder!...no=D% 8  op X 8oooDDDDDDD  0//hJB'1hJP@KB BBBB_UDE1hJZ@B@@pGNTXNHhCKrB1x(@@0pG@@pGGCC: (Ubuntu/Linaro 5.4.0-6ubuntu1~16.04.9) 5.4.0 20160609A2aeabi(7-A A  ".shstrtab.interp.note.ABI-tag.note.gnu.build-id.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rel.dyn.rel.plt.init.text.fini.rodata.ARM.exidx.eh_frame.init_array.fini_array.jcr.dynamic.got.data.bss.comment.ARM.attributes TTpp !$4o<> FppXNo[o j s B8|88 wDDhpdd ll ,,,0;p3*ude-syssec-challenge/README.md0000644000175000017500000000135513357403760015165 0ustar f0rkif0rkiSYSSEC @ UDE Challenge ====================== This is a typical crackme challenge. You are given a binary, which validates a password. You need to apply reverse engineering to extract the password validation routine and find a valid password, which is accepted by the challenge. When applying for a position at the secure software systems group provide a very short write-up (maximum 20 lines, with max 80 characters per line) in **plain text or markdown** (do not send word or pdf) and a valid password (note there should be only one valid password and it has a meaning in the english language) along with your applciation. **Provide the valid password also as plain text in the body of your application e-mail!** (we use this as spam filter)