# Reverse engineering - light up the server

## **Solution**

### **After Analyzing the server in IDA Pro and Flare CAPA**

<figure><img src="https://3314490488-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MbvhwyfSiuEoRfDEQp1%2Fuploads%2Fbfu1Ss5erQLWhPi1MHD1%2Fimage.png?alt=media&#x26;token=5df32e94-ef4f-4a4e-973b-d684395e5d73" alt=""><figcaption><p>Flare capa</p></figcaption></figure>

**The rule detected a regex as obfuscated stack strings**

```
/^([a-z]?[^a-e,g-z])la[g]{(h)0(s)t_\2(e)4d\4(r([_]?[^a-z]))(!)n((j(3))cti0)n(_)1s\6{1}5up3\5c3wl}$/gm
```

### Finding a match string via regex101

<figure><img src="https://3314490488-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MbvhwyfSiuEoRfDEQp1%2Fuploads%2FEUk7T6kxhL1h5EzoWVUV%2Fimage.png?alt=media&#x26;token=47d3dc10-98a4-40df-a48b-c3ab48032f87" alt=""><figcaption><p>Match flag</p></figcaption></figure>

### The Flag

```
flag{h0st_he4der_!nj3cti0n_1s_5up3r_c3wl}
```
