Solving AVR reverse engineering challenge with radare2 - rhme2 Jumpy (reversing 100)
62.3 هزار بار بازدید -
7 سال پیش
-
We are using radare2 together
We are using radare2 together with avr-gdb and simavr to reverse engineer the challenge "Jumpy" which implemets a password checking algorithm.
(?s)lds r24[a-Z, 0-9;\.$^]+\n[a-Z, 0-9;\.$^│]+\n[a-Z, 0-9;\.$^│]+\n[a-Z, 0-9;\.$^│]+lds r24
Challenge files: https://github.com/Riscure/Rhme-2016
The .gdbinit from this video: https://github.com/cyrus-and/gdb-dash...
=[ 🔴 Stuff I use ]=
→ Microphone:* https://geni.us/ntg3b
→ Graphics tablet:* https://geni.us/wacom-intuos
→ Camera#1 for streaming:* https://geni.us/sony-camera
→ Lens for streaming:* https://geni.us/sony-lense
→ Connect Camera#1 to PC:* https://geni.us/cam-link
→ Keyboard:* https://geni.us/mech-keyboard
→ Old Microphone:* https://geni.us/mic-at2020usb
US Store Front:* https://www.amazon.com/shop/liveoverflow
=[ ❤️ Support ]=
→ per Video: Patreon: liveoverflow
→ per Month: @liveoverflow
=[ 🐕 Social ]=
→ Twitter: Twitter: LiveOverflow
→ Website: https://liveoverflow.com/
→ Subreddit: Reddit: LiveOverflow
→ Facebook: Facebook: LiveOverflow
=[ 📄 P.S. ]=
All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
#ReverseEngineering #CTF
(?s)lds r24[a-Z, 0-9;\.$^]+\n[a-Z, 0-9;\.$^│]+\n[a-Z, 0-9;\.$^│]+\n[a-Z, 0-9;\.$^│]+lds r24
Challenge files: https://github.com/Riscure/Rhme-2016
The .gdbinit from this video: https://github.com/cyrus-and/gdb-dash...
→ Microphone:* https://geni.us/ntg3b
→ Graphics tablet:* https://geni.us/wacom-intuos
→ Camera#1 for streaming:* https://geni.us/sony-camera
→ Lens for streaming:* https://geni.us/sony-lense
→ Connect Camera#1 to PC:* https://geni.us/cam-link
→ Keyboard:* https://geni.us/mech-keyboard
→ Old Microphone:* https://geni.us/mic-at2020usb
US Store Front:* https://www.amazon.com/shop/liveoverflow
→ per Video: Patreon: liveoverflow
→ per Month: @liveoverflow
→ Twitter: Twitter: LiveOverflow
→ Website: https://liveoverflow.com/
→ Subreddit: Reddit: LiveOverflow
→ Facebook: Facebook: LiveOverflow
All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
#ReverseEngineering #CTF
7 سال پیش
در تاریخ 1396/01/04 منتشر شده
است.
62,355
بـار بازدید شده