Hi, This was the first binary that I tried to reverse engineer with ghidra and is great for a beginner like me. I managed to get the password, but there are some things that i don't understand and I was looking for someone who can explain some things to me.
First, the password variable seems to be backwards and the last byte is the same as the xor key. Second, when checking the password shouldn't it overflow?
Sorry if this are noob questions or if this is not the place to ask. Here is a screenshot of my decompiled code.
https://imgpile.com/images/7eVscb.png |
==> |