| nasm crack |
2025-12-30 12:46 |
Static analysis using strings and objdump. Password found in plaintext via strings command. Includes explanation of NASM syscalls and repz cmpsb string comparison. |
| Level1 |
2025-12-29 22:38 |
Detailed walkthrough of static analysis using objdump.
Explains the character-by-character comparison pattern in x86-64 assembly.
Covers: reconnaissance with file/strings, reading cmp/jne instructions, hex to ASCII conversion.
Includes explanation of registers (rax, eax, al) and lessons learned for beginners. |
| easy_reverse |
2025-12-29 22:01 |
Static analysis using objdump. Identified 3 checks in main():
1. argc == 2 (need exactly 1 argument)
2. strlen(password) == 10 (0xa in hex)
3. password[4] == '@' (0x40 in hex)
Valid password format: XXXX@XXXXX (10 chars, '@' at index 4)
Example: test@psswd → flag{test@psswd} |