czwartek, 5 sierpnia 2021

Cracking with Ghidra - Part 2

According to the previous part today we'll try to understand another 'crackme'. Here we go...

This time we'll start here:


Just like before - let's open our target binary in Ghidra:


 Yep. Checking (in console:

). Ok, let's continue below and try to analyse the target binary:


So far we should be somewhere here:

According to our previous 'assembly adventures' - it should now be easier to "spot the key" in the source:

Isn't it? ;)


See you next time! ;)


Cheers












#czarzly

Brak komentarzy:

Prześlij komentarz