vulnerable-secret

Vulnerable Secret Extraction

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "vulnerable-secret" with this command: npx skills add letta-ai/skills/letta-ai-skills-vulnerable-secret

Vulnerable Secret Extraction

Overview

This skill provides a systematic methodology for extracting secrets (flags, keys, passwords) from protected or obfuscated binary executables. It emphasizes methodical analysis, proper verification of findings, and avoiding common pitfalls in binary reverse engineering.

Systematic Analysis Workflow

Follow these phases in order for reliable results:

Phase 1: Initial Reconnaissance

Gather basic information about the target before deeper analysis:

File type identification - Determine binary format (ELF, PE, Mach-O)

file <binary>

Check permissions and attributes

ls -la <binary>

Identify architecture and linking

readelf -h <binary> # For ELF binaries

List sections and segments

readelf -S <binary> # Section headers readelf -l <binary> # Program headers

Phase 2: Symbol and String Analysis

Extract human-readable information:

Dump strings - Look for embedded text, error messages, and potential secrets

strings <binary> strings -a <binary> # All sections

Check symbol table - Identify function names and exported symbols

nm <binary> readelf -s <binary>

Look for dangerous functions - Identify potential vulnerabilities

  • gets , strcpy , sprintf

  • Buffer overflow candidates

  • system , exec*

  • Command injection points

  • ptrace

  • Anti-debugging protection

Phase 3: Disassembly and Code Analysis

Examine the actual code:

Disassemble key functions

objdump -d <binary> objdump -d -M intel <binary> # Intel syntax

Focus on specific areas:

  • main function entry point

  • Functions referencing interesting strings

  • Data sections containing potential encoded secrets

Identify encoding schemes - Look for:

  • XOR operations with constant keys

  • Base64 encoding patterns

  • Custom obfuscation routines

Phase 4: Data Extraction and Decoding

Extract and decode hidden data:

Extract raw data sections

objcopy -O binary --only-section=.rodata <binary> rodata.bin hexdump -C <binary>

Common decoding operations:

  • XOR decoding: Identify the key from disassembly, apply to encoded data

  • Base64: Look for character set patterns

  • Custom algorithms: Trace through disassembly to understand transformation

Python decoding template:

XOR decoding example

encoded = bytes.fromhex('HEXDATA') key = 0xKEY decoded = bytes([b ^ key for b in encoded]) print(decoded.decode('utf-8', errors='ignore'))

Phase 5: Dynamic Analysis (When Safe)

If static analysis is insufficient:

Check for anti-debugging:

  • ptrace calls

  • Timing checks

  • Environment detection

Bypass techniques:

  • LD_PRELOAD to override functions

  • Patching binary to skip checks

  • Using debugger scripts

Run with monitoring:

strace <binary> ltrace <binary>

Verification Strategies

Always verify findings before concluding:

Cross-reference disassembly - Ensure the decoding logic matches what the code does

Validate decoded output - Check that results are plausible (readable text, expected format)

Test edge cases - Verify handling of:

  • Partial data

  • Incorrect keys

  • Malformed input

Document the derivation - Record which specific instructions or data led to conclusions

Common Pitfalls

Analysis Mistakes

Incomplete disassembly review - When output is truncated, explicitly request additional sections rather than making assumptions about unseen code

Jumping to conclusions - Avoid assuming encoding schemes without seeing the actual instructions that implement them

Ignoring vulnerability hints - If function names or flag content suggest an attack vector (e.g., "buffer_overflow" in the flag), explore that path even if static analysis succeeds

Implementation Errors

Hex string formatting - Ensure hex strings have no spaces or invalid characters before decoding

Key identification - Verify the XOR key or encoding parameter from actual disassembly, not from data patterns alone

Endianness issues - Consider byte order when extracting multi-byte values

Workflow Inefficiencies

Repeated tool calls - Combine related checks (file type + permissions + sections) when possible

Excessive verification - Once content is confirmed written, avoid redundant reads

Missing tool output - If disassembly is truncated, request specific address ranges rather than re-running the entire dump

Decision Tree

Start │ ├─► Run file identification │ └─► Is it an executable? ─No─► Check if packed/obfuscated │ │ │ Yes │ │ ├─► Extract strings │ └─► Found readable secret? ─Yes─► Verify and extract │ │ │ No │ │ ├─► Check for dangerous functions │ └─► Found gets/strcpy? ─Yes─► Consider buffer overflow │ │ │ No/Also │ │ ├─► Disassemble and analyze │ └─► Found encoding logic? ─Yes─► Extract key and decode │ │ │ No │ │ ├─► Check for anti-debugging │ └─► Present? ─Yes─► Bypass or use static analysis │ │ │ No │ │ └─► Dynamic analysis with tracing

Output Requirements

When extracting secrets:

  • Verify the output format matches expected patterns (e.g., FLAG{...}, key format)

  • Save to the correct location as specified in task requirements

  • Confirm file was written successfully before concluding

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

extracting-pdf-text

No summary provided by upstream source.

Repository SourceNeeds Review
General

video-processing

No summary provided by upstream source.

Repository SourceNeeds Review
General

google-workspace

No summary provided by upstream source.

Repository SourceNeeds Review
General

portfolio-optimization

No summary provided by upstream source.

Repository SourceNeeds Review