Reference no: EM133357294
Malware and Hacking - Computer Application Security
Assignment -
Introduction
By now many of you have heard of (and maybe even competed in) a CTF (Cap- ture the Flag) competition. One of the ‘foundational' challenge types in a CTF competition is the CrackMe file.
A CrackMe file is described as "a small program designed to test a programmer's reverse engineering skills.". The two primary tools used in a CrackMe challenge are the disassembler and debugger. We are fortunate to also have a decompiler at our disposal (Ghidra).
This assignment hopes to exercise/strengthen your capabilities with the debugger and disassembler tools we have been using to analyze malware. The challenges are designed to be more difficult as your proceed through them, so starting with the first question is recommended. Please try to see these crackme's as a brain-teaser type of puzzle - you may end up spending a significant amount of time just staring at the screen - this is expected and should be embraced - and will add to your personal sense of satisfaction when you finally ‘crack the code'.
Your deliverable for this assignment will be a MSWord or PDF (only) document that includes the password or phrase from each challenge along with screenshots and (if requested) a ‘conversational' description of how you cracked the code.
Please note that only full, edge-to-edge screenshots that are readable will be ac- cepted. Any question lacking supporting screenshots will not be marked.
Specification
1.Download the ISO image from eConestoga 2.Transfer 5 files to your analysis system(s) 3.Analyze/crack/unravel
4.Write your report
Deliverable
1. Q1.exe - Using only a disassembler (Ghidra/IDA), find the password. Deliv-
erable: Snap a screenshot of Ghidra/IDA with password (clearly) visible.
2. Q2.exe - Using only a disassembler (Ghidra/IDA), find the password(s). De- liverable: Snap a screenshot (or 2 - as required) of Ghidra/IDA with password(s) (clearly) visible.
3. Q3.exe - Using only a disassembler (Ghidra/IDA), find the password(s). Then go to the command line and check your work. Deliverable: Snap a screen- shot of Ghidra/IDA and a screenshot of CMD.exe window with successful password.
4. Q4.exe - Using only a disassembler (Ghidra/IDA), find the password(s). Then go to the command line and check your work. Deliverable: Snap a screen- shot of Ghidra/IDA and a screenshot of CMD.exe window with successful password and provide a 5-7 sentence explanation of how you arrived at the password. See note in Deductions section regarding the uniqueness requirement of your explanation.
5. Q5.gar - Import this Ghidra Archive file into Ghidra and find the password(s). Deliverable: Snap a screenshot of Ghidra and provide a 5-7 sentence explanation of how you arrived at the password. See note in Deductions section regarding the uniqueness requirement of your explanation.
Attachment:- Malware and Hacking.rar