#aor24

2025-01-02

This is beautiful. #aor24 day 15 #bindiffing #radare2

2024-12-26

Even I don’t know what config use by default atm, I’ve found the #aor24 14 a very nice approach to configure your own setup according to the needs :)

:radare2: radare :verified:radareorg@infosec.exchange
2024-12-20
2024-12-19

My #aor24 day 13 result:

pdb @@= 0x004014a2 0x0040150e 0x0040155e 0x0040f04b

I hate myself a little too much because of my delay. Fucking anxiety abrfffff

:radare2: radare :verified:radareorg@infosec.exchange
2024-12-18

One week left to finish the advent calendar of radare! Which post did you enjoyed the most until the date? Share your feedback and learning tips using the #aor24 hashtag!

:radare2: radare :verified:radareorg@infosec.exchange
2024-12-17

If you want to solve the 7th advent challenge you can take this commit as inspiration github.com/radareorg/radare2/c

🗓️-> radare.org/advent/07.html #aor24

pancake :radare2:pancake@infosec.exchange
2024-12-15

Yesterday’s advent post have the notebook llm podcast attached just because i find it pretty informative and well structured for the contents. I must find a good free tts and do the same for the other posts using r2ai. radare.org/advent/14.html #radare2 #aor24

:radare2: radare :verified:radareorg@infosec.exchange
2024-12-13

Did you solved yesterday’s advent crackme using ESIL emulation? If so, can you write a oneliner that solves it without any interactive prompt or visual interactions? Post it if you do! Today's advent post will help you learn about moving around the disassembly more swiftly! radare.org/advent/12.html #aor24

2024-12-13

when you end with 0x38 ^ 0x38 because moew #aor24 day 12.

2024-12-12

December is upon up, and so is the #Radare Advent Calendar, packed with tips, tricks, and challenges to discover new ways to master #radare2! Join @pancake and the community with the hashtag #aor24 and follow along: radare.org/advent

2024-12-11

#aor24 day 11 challenge has given me an idea to try to solve something that has been in my mind for a while :D
#LetsDropThisHeap

2024-12-10

#aor24 10 is like a wet dream… something my 13 years ago self wanted to implement, but some shit and life happened.

2024-12-10

Ooh, this looks interesting

Advent Of Radare2
radare.org/advent/

#aor #aor24

:radare2: radare :verified:radareorg@infosec.exchange
2024-12-10

Are you enjoying the #aor24 Advent of Radare?

:radare2: radare :verified:radareorg@infosec.exchange
2024-12-10

Got Root? the 10th post of the advent of radare digs into the kernel memory to patch the cred struct to escalate privileges using the r2k plugin radare.org/advent/10.html #linux #kernel #radare2 #aor24 #reverseengineering radare.org/advent/10.html

2024-12-09

I feel like a dummy fuzzer with #aor24 xD
But now i'm up to date, and the 09 was fun to read and know more stuff about ARM and watching how instructions are microprogrammed :)

:radare2: radare :verified:radareorg@infosec.exchange
2024-12-07

✨This weekend syncs with the first week of the Advent of Radare! Take some weekend time to catch up with the challenges and learn new features and syntax tricks! radare.org/advent #aor24

2024-12-06

#aor24 day 5 was also fun platino with hexdumps, but i guess i’ll review it again as i was a bit distracted (train issues). Also want to implemente my own backtrace in js :3

2024-12-06

I'm a bit late with #aor24 due to health issues, but the day 4 was a funny one.

I’ll write my howto and finally my result, just in case someone wants to skip it :)

I used rax2 to extract the b64: “rax2 -D `cat b64file` > file” , and file was a .xz that contained a Mach-O (using i command within r2).
Analyzing the strings with izzz, there were a lot of swift references, so, as the doc said, /az is our bestie there.
Running that command, some strings appeared that could be potentially the password. I had my guess but seeked to the position of the previous string, printed the next 20 instructions and after my suspected string found something like this “bl sym _stringCompareWithSmolCheck…”, which from my dummy knowledge seems that is comparing the string, so I tested it on the binary and boooom. It worked!

<spoiler>
the password was flag4advent
</spoiler>

#radare2 #reverseengineering

2024-12-03

Day 03 of #aor24 was more focused on the analysis stuff. The stats of a dummy program I made yesterday are quite hilarious compared to "real" life programs, but anyway hehe.

I've also found that we need to improve some help msgs in r2 as some info is missing, but that's another story :)

#radare2

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst