New #security #blog post on #SkullSecurity by @iagox86: BSidesSF 2025: bug-me (hard reversing challenge), filed under #bsidessf-2025, #ctfs

https://www.skullsecurity.org/2025/bsidessf-2025-bug-me-hard-reversing-challenge-

(Replies here will show up on the blog post)

BSidesSF 2025: bug-me (hard reversing challenge)

Every year, I make a list of ideas and it contains the same thing: “process that debugs itself”. It’s from a half-remembered Windows challenge I solved when I was very new to CTFs. I’m obsessed with that concept, having messed with writing debuggers a few times (including Mandrake), and blogging about process injection. You’ll find a few challenges influenced by that those concepts thie yar, but this time we’re gonna look at bug-me. You can download source and the challenge (including solution) here.

SkullSecurity Blog
BSidesSF CTF 2025 RE  bug-me writeup

The file is not stripped - for a reason we’ll see. The binary is easily decompiled. So simple. But when we run this the binary doesn’t crash at...

happy hacks