According to the previous part today we'll try to understand another 'crackme'. Here we go...
This time we'll start here:
Just like before - let's open our target binary in Ghidra:
Yep. Checking (in console:
). Ok, let's continue below and try to analyse the target binary:
So far we should be somewhere here:
According to our previous 'assembly adventures' - it should now be easier to "spot the key" in the source:
See you next time! ;)
Brak komentarzy:
Prześlij komentarz