<?xml version="1.0" encoding="utf-8"?>
<!-- generator="FeedCreator 1.7.2-ppt DokuWiki" -->
<?xml-stylesheet href="http://wiki.zenk-security.com/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="http://wiki.zenk-security.com/feed.php">
        <title>Zenk - Security hackingweek_2014:reverse</title>
        <description></description>
        <link>http://wiki.zenk-security.com/</link>
        <image rdf:resource="http://wiki.zenk-security.com/lib/tpl/dokuwiki/images/favicon.ico" />
       <dc:date>2026-04-17T23:58:38+02:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:reverse:reverse1&amp;rev=1394275956&amp;do=diff"/>
                <rdf:li rdf:resource="http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:reverse:reverse2&amp;rev=1394275946&amp;do=diff"/>
                <rdf:li rdf:resource="http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:reverse:reverse3&amp;rev=1394275995&amp;do=diff"/>
                <rdf:li rdf:resource="http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:reverse:reverse4&amp;rev=1394276387&amp;do=diff"/>
                <rdf:li rdf:resource="http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:reverse:reverse5&amp;rev=1394275923&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="http://wiki.zenk-security.com/lib/tpl/dokuwiki/images/favicon.ico">
        <title>Zenk - Security</title>
        <link>http://wiki.zenk-security.com/</link>
        <url>http://wiki.zenk-security.com/lib/tpl/dokuwiki/images/favicon.ico</url>
    </image>
    <item rdf:about="http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:reverse:reverse1&amp;rev=1394275956&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2014-03-08T11:52:36+02:00</dc:date>
        <title>hackingweek_2014:reverse:reverse1</title>
        <link>http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:reverse:reverse1&amp;rev=1394275956&amp;do=diff</link>
        <description>Executable : &lt;https://repo.zenk-security.com/hackingweek2014_ctf/crackme-01&gt;


$ file crackme-01
crackme-01: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), for GNU/Linux 2.6.32, dynamically linked (uses shared libs), stripped


Le crackme 1 est un ELF 32 bits basique.</description>
    </item>
    <item rdf:about="http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:reverse:reverse2&amp;rev=1394275946&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2014-03-08T11:52:26+02:00</dc:date>
        <title>hackingweek_2014:reverse:reverse2</title>
        <link>http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:reverse:reverse2&amp;rev=1394275946&amp;do=diff</link>
        <description>Executable : &lt;https://repo.zenk-security.com/hackingweek2014_ctf/crackme-02&gt;


$ file crackme-02
crackme-02: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), for GNU/Linux 2.6.32, dynamically linked (uses shared libs), stripped


Le crackme 2 est un ELF 32 bits basique.</description>
    </item>
    <item rdf:about="http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:reverse:reverse3&amp;rev=1394275995&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2014-03-08T11:53:15+02:00</dc:date>
        <title>hackingweek_2014:reverse:reverse3</title>
        <link>http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:reverse:reverse3&amp;rev=1394275995&amp;do=diff</link>
        <description>Executable : &lt;https://repo.zenk-security.com/hackingweek2014_ctf/crackme-03&gt;


$ file crackme-03
crackme-03: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), for GNU/Linux 2.6.32, dynamically linked (uses shared libs), stripped


Le crackme 3 est un ELF 32 bits.</description>
    </item>
    <item rdf:about="http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:reverse:reverse4&amp;rev=1394276387&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2014-03-08T11:59:47+02:00</dc:date>
        <title>hackingweek_2014:reverse:reverse4</title>
        <link>http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:reverse:reverse4&amp;rev=1394276387&amp;do=diff</link>
        <description>Executable : &lt;https://repo.zenk-security.com/hackingweek2014_ctf/crackme-04&gt;

WARNING: crackme-04 a été changé entre le moment ou je l'ai fait et la fin du challenge. En effet, l'unpacking fonctionnait avec upx -d, ce qui n'est plus le cas maintenant</description>
    </item>
    <item rdf:about="http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:reverse:reverse5&amp;rev=1394275923&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2014-03-08T11:52:03+02:00</dc:date>
        <title>hackingweek_2014:reverse:reverse5</title>
        <link>http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:reverse:reverse5&amp;rev=1394275923&amp;do=diff</link>
        <description>Executable : &lt;https://repo.zenk-security.com/hackingweek2014_ctf/crackme-05&gt;


$ file crackme-05
crackme-05: ELF 64-bit LSB executable, x86-64, version 1 (GNU/Linux), for GNU/Linux 2.6.32, statically linked, stripped


Le crackme 5 est un ELF 64 bits, compilé en static, strippé. Nous n'aurons pas cette fois les symboles pour nous aider.</description>
    </item>
</rdf:RDF>
