Programming Diary
  • Home
  • Tag
  • About
  • Weblinks
Basic Reverse Engineering by using GDB

Basic Reverse Engineering by using GDB

ProblemThe challenge is to determine the correct set of five inputs expected by each of the four safes (s1, s2, s3, s4). Running the binary file prompts you to input guesses sequentially, as demonst
2024-11-29
#Reverse Engineering
12

Suchen

Hexo Fluid
Total Visited Times Total Unique Visitors