PicoCTF 2014 Write-ups

Cyborg Secrets - 80 (Reverse Engineering)

Writeup by Oksisane

Created: 2014-11-07 17:26:27

Last modified: 2014-11-10 00:38:04


You found a password protected binary on the cyborg relating to its defensive security systems. Find the password and get the shutdown code! You can find it on the shell server at /home/cyborgsecrets/cyborg-defense or you can download it here.


I wonder if they hardcoded the password string.



Open the given program in a text editor (such as Notepad ++) or disassembler (such as Hex-Rays IDA) to find the password in plaintext, then input it into the program to get the flag.


The hint indicates that the password is hardcoded into the program. Opening the program with a text editor or disassembler reveals the debug admin password 2manyHacks_Debug_Admin_Test. To get the flag we input this into the program running on the shell, using the command ./cyborg_defence 2manyHacks_Debug_Admin_Test (where the ./cyborg_defence executes the cyborg_defence program).