Follow the asm
In this reverse engineering challenge we would see that static analysis doesn't provides us that much of info. to solve, so we need to dynamically understand the behaviour of the program, and under...
In this reverse engineering challenge we would see that static analysis doesn't provides us that much of info. to solve, so we need to dynamically understand the behaviour of the program, and under...
In this we will see that how ud2a and ud2 instruction effect the static analysis and how can we handle or bypass them in tool like Ghidra to continue disassembling the binary, identify program flow...
This challenge is easy just by looking into the decompiled version one can obtain the logic and using simple math operation this challenge can be solved.
This challenge make use of disassembly and creating the pseudo-code for the function, analysis of the decompiled function to solve the challenge.
In this reverse engineering challenge we will see how we can idenitfy the behavior of functions, resolving dependencies and communication between processes.
In this reverse engineering challenge we will see some anti-debugging methods used by the binary and how we could make our path to solve our challenge.