Basic Reverse Engineering by using GDB ProblemThe challenge is to determine the correct set of five inputs expected by each of the four safes (s1, s2, s3, s4). Running the binary file prompts you to input guesses sequentially, as demonst 2024-11-29 #Reverse Engineering