SpookyPass
Extracted STRINGS to steal password.
Link
Process
They’re coming to get you, Barbara. That’s right a challenge called SpookyPass.
First up, let’s run file to know what type of file that we are have.
bash
┌──(kali㉿kali)-[~/Desktop/rev_spookypass] └─$ file pass pass: ELF 64-bit LSB pie executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=3008217772cc2426c643d69b80a96c715490dd91, for GNU/Linux 4.4.0, not stripped
Run the binary to see what it does.
bash
┌──(kali㉿kali)-[~/Desktop/rev_spookypass] └─$ ./pass Welcome to the SPOOKIEST party of the year. Before we let you in, you'll need to give us the password: biteme You're not a real ghost; clear off!
Run strings against the binary. Search the list for the password.
bash
<snip> Welcome to the [1;3mSPOOKIEST [0m party of the year. Before we let you in, you'll need to give us the password: s3cr3t_p455_f0r_gh05t5_4nd_gh0ul5 Welcome inside! You're not a real ghost; clear off! <snip>
Re-run the program and use the password from strings.
bash
┌──(kali㉿kali)-[~/Desktop/rev_spookypass] └─$ ./pass Welcome to the SPOOKIEST party of the year. Before we let you in, you'll need to give us the password: s3cr3t_p455_f0r_gh05t5_4nd_gh0ul5 Welcome inside! <redacted>