Simply reverse engineering challenges


I made this challenge for my 13 year old son, when he wanted to test his hacking skills. Maybe this was not the best introduction challenge for my son, because he lost his interest in hacking after playing with this one 🙂 There are at least three different ways to play with this simply challenge

  • scripting (brute force),
  • reverse engineering by Ida/similar and
  • GDB (Linux debugger)

Challenge will print the flag. The processing time of flag printing seems to be longish.

a bit more complicated variant of the first one. Still need to enter a correct number but now its not a fixed one, and processing of an user given number seems to take almost as long as delivery of belts 🙂

In this challenge you have an opportunity to familiarize yourself with a brand new Idan23-interpreted language. Idan23 market introduction is following the trend that things tend to get released before the whole functionality is available.

Idan23-interpreted language fun. Why interpreter should not print detected unknown commands.. This was used as an unintended solution for Idan23 boss challenge. Now its offered as a separate challenge.

Even more Idan23-interpreted language fun. To guarantee superior hacker experience, corrupted Idan23-program files are not executed.

The Idan23-interpreted language boss challenge. Intended solution for this functioned nicely for most of Yan85 challenges as an unintended solution ( years 21-22 edition). You will lose many fun if use it for them all.


This scoreboard reflects solves for challenges in this module after the module launched in this dojo.

Rank Hacker Badges Score