|
You are here |
satharus.me | ||
| | | | |
gebir.ge
|
|
| | | | | [AI summary] The author documents their learning journey into binary analysis by manually patching assembly instructions and using LD_PRELOAD hooking to reverse the logic of a string comparison function. | |
| | | | |
www.bitsnbites.eu
|
|
| | | | | [AI summary] This article provides a quick introduction to developing software for the open-source MRISC32 32-bit RISC architecture using a GCC-based toolchain and a simulator, including examples from compiling C code and running DOOM. | |
| | | | |
squanderingti.me
|
|
| | | | | Exploring the innards of an ELF binary to find the physical location of main. | |
| | | | |
blog.nuculabs.de
|
|
| | | I've recently finished reading a book called Practical Binary Analysis which I consider a state of the art book (review will come soon) and I would like to post my solution to the crackme found in chapter 5. 1. A New CTF ChallengeComplete the new CTF challenge unlocked by the oracle program!You can complete the entire challenge using only the tools discussedin this chapter and what you learned in Chapter 2. After completingthe challenge, don't forget to give the flag you found to the oracle tounlock the next challenge | ||