Binary Reverse Engineering
Overview
HTB Academy Lab Solution
Lab: Database Credentials Discovery
Method 1: ELF Binary Analysis (GDB)
# Connect to target
ssh htb-student@10.129.205.20
# Navigate to binary location
find / -name "octopus_checker" 2>/dev/null
# Run initial examination
./octopus_checker
# Expected: SQL connection attempt with driver error
# Debug with GDB
gdb ./octopus_checker
# Set disassembly style
set disassembly-flavor intel
# Disassemble main function
disas main
# Set breakpoint at SQLDriverConnect call
b *0x5555555551b0
# Run program
run
# Examine RDX register for connection string
# Expected: "DRIVER={ODBC Driver 17 for SQL Server};SERVER=localhost,1401;UID=username;PWD=password;"Reverse Engineering Techniques
1. ELF Binary Analysis
2. .NET Assembly Analysis
3. Connection String Patterns
Technical Details
ELF Binary Analysis
.NET DLL Examination
Common Locations
Impact & Exploitation
Detection & Defense
Last updated