asm3

Reverse Engineering Assembly code for a 32-bit linux binary provided with 3 calling arguments.  The arguments are passed in the stack when using the x32 calling convention. Follow the program…

Continue Readingasm3

asm2

Reverse Engineering Assembly code for a 32-bit linux binary provided with 2 calling arguments.  The arguments are passed in the stack when using the x32 calling convention. Follow the program…

Continue Readingasm2

asm1

Reverse Engineering Assembly code provided with 1 calling argument.  Follow the program to get the result.Function call:  asm1(0x2e0)Assembly Code:asm1:    <+0>:    push   ebp    <+1>:    mov    ebp,esp    <+3>:    cmp    DWORD PTR [ebp+0x8],0x3fb  …

Continue Readingasm1

Investigation_encoded_1

Forensics WriteUp: https://github.com/Dvd848/CTFs/blob/master/2019_picoCTF/investigation_encoded_1.mdA Linux binary file and an output containing the encoded flag is provided. The flag is encoded using bit shifting and values in two arrays.   Each letter in…

Continue ReadingInvestigation_encoded_1