czwartek, 5 sierpnia 2021

Intro to Ghidra

So ;) as we already 'can write' some ASM code - this time we'll try to read it... using Ghidra. Here we go...

This time we can start here:

Using 'our previous examples' it's also a good idea in case of "checking new tool like Ghidra". ;)

To continue our little-asm-adventure I used the same environment as we used last time[1, 2].

When your Ghidra installation is ready - we should be somewhere here:

Crackme is parsed by Ghidra so now it should be easier to 'read the ASM'. For example - similar to our previous adventures with IdaPro - we can check the code flow, like this (goto Analysis -> Code flow):


After a while with this crackme it should be easy to spot the correct key. ;)

Next step?

Correct! ;)


See you next time!


Cheers






 

 

 


 

 

Brak komentarzy:

Prześlij komentarz