Umd 2023 Rev - Well Connected
For the past few months, I’ve been learning to use the Binary Ninja api to level up my reversing skills. Here’s a demo of how powerful scripting is.
For this writeup, I will demostrate as much as I can using the binaryninja api. But also so I can have a reference if I ever forget
Initial Findings⌗
Challenge files can be found here
I pulled up to a party but they wouldn’t let me in until I named 40 functions! 😡
Opening this up in binaryninja, we see a very large number of functions.
But yet, main does not seem to do anything 🤔
and main
seems to only call puts
Ok. let’s take a look at one of these functions
It seems to call a bunch of other functions, and return arg1 << arg2
.
In fact, it seems like this pattern follows for all of these functions. Call a ton of functions and return.
Ok, let’s do a sanity check
Ok, all but one function seems to follow this behaviour (We will see later this function is important).
What does Well Connected mean?⌗
If you happen to have a background in Computer Science or Competitive Programming, “Well Connected” could refer to a Well Connected Graph (aka Strongly Connected Graph). So then I had the idea

Before constructing the graph, I looked at the callees of every function to see if any of them would be the “start” node.
Ok, this function stands out. It is the only function which is not being called, with no arguements. Let’s look at the decompilation.
Remember those return values in those functions? Let’s see what sub_469bc9(0x4e, 7)
returns
This is likely the flag! Trying out the next few letters gives UMDCTF{
the flag prefix.
What we can do now is loop through all the instructions and calculate the return values
Flag: UMDCTF{h3r35_my_numb3r_50_c411_m3_m4yb3}