So ;) as we already 'can write' some ASM code - this time we'll try to read it... using Ghidra. Here we go...
This time we can start here:Using 'our previous examples' it's also a good idea in case of "checking new tool like Ghidra". ;)
To continue our little-asm-adventure I used the same environment as we used last time[1, 2].
When your Ghidra installation is ready - we should be somewhere here:
Crackme is parsed by Ghidra so now it should be easier to 'read the ASM'. For example - similar to our previous adventures with IdaPro - we can check the code flow, like this (goto Analysis -> Code flow):
After a while with this crackme it should be easy to spot the correct key. ;)
Next step?
Correct! ;)
Brak komentarzy:
Prześlij komentarz