asm3

Reverse Engineering Assembly code for a 32-bit linux binary provided with 3 calling arguments.  The arguments are passed in the stack when using the x32 calling convention. Follow the program…

Continue Readingasm3

asm2

Reverse Engineering Assembly code for a 32-bit linux binary provided with 2 calling arguments.  The arguments are passed in the stack when using the x32 calling convention. Follow the program…

Continue Readingasm2

asm1

Reverse Engineering Assembly code provided with 1 calling argument.  Follow the program to get the result.Function call:  asm1(0x2e0)Assembly Code:asm1:    <+0>:    push   ebp    <+1>:    mov    ebp,esp    <+3>:    cmp    DWORD PTR [ebp+0x8],0x3fb  …

Continue Readingasm1

B1ll_Gat35

Reverse Engineering The Windows 32bit binary takes two user inputs.  The first input is a number which has between  1 to 5 digits.  The second is a key which will…

Continue ReadingB1ll_Gat35