[Pwnable/Code Auditing] NoREpls - Part 7

exploitation
windows
reverseengineering
codeauditing

#1

Backstory

It has been a year and a half since edgyReggie halted development of his precious software. However, due to having a terrible lecturer for his programming courses, who lacks any sense of secure development practices, and unfortunate circumstances, a self-proclaimed hacker has threatened to release a DoS 0-day exploit (ooooh scary!).

edgyReggie is now calling all his beloved hackers to aid him in discovering the vulnerability in his software so that he can make NoREpls great again! To help you, he has released a special version that will allow you to register the software using any Username/Serial combination!

Difficulty

Author Assigned Level: Wannabe

Community Assigned Level:

  • Newbie
  • Wannabe
  • Hacker
  • Wizard
  • Guru

0 voters


Goal

  • Your primary goal is to discover the DoS vulnerability
  • Your secondary goal is to develop a working DoS exploit or document steps to trigger the exploit

Rules of Engagement

  • No binary patching or any modifications to the software or environment to gain an advantage (enable all system default exploitation protection mitigations)
  • You may refer to the source code listed under the Research Material section below.

Research Material

Source code

GitHub - NoREpls


Binary

Version 2.2.1 special release version

MediaFire - https://www.mediafire.com/file/3ma9rax9irayg49/NoREpls2.2.1.exe/file

transfer.sh - https://transfer.sh/Jbiuo/NoREpls2.2.1.exe

VirusTotal - https://www.virustotal.com/#/file/f9247a2b0a70348f5ad11e472d41f0901671f4f2e7b6afdd2294bfd9b2a7b80e/detection

Good luck! :wink:


(fxbg) #2

What are the sizes on these files?


#3

It’s statically compiled to avoid missing dependencies.