Solving AVR reverse engineering challenge with radare2 - rhme2 Jumpy (reversing 100)

LiveOverflow
LiveOverflow
62.3 هزار بار بازدید - 7 سال پیش - We are using radare2 together
We are using radare2 together with avr-gdb and simavr to reverse engineer the challenge "Jumpy" which implemets a password checking algorithm.

(?s)lds r24[a-Z, 0-9;\.$^]+\n[a-Z, 0-9;\.$^│]+\n[a-Z, 0-9;\.$^│]+\n[a-Z, 0-9;\.$^│]+lds r24

Challenge files: https://github.com/Riscure/Rhme-2016
The .gdbinit from this video: https://github.com/cyrus-and/gdb-dash...


=[ 🔴 Stuff I use ]=

→ Microphone:* https://geni.us/ntg3b
→ Graphics tablet:* https://geni.us/wacom-intuos
→ Camera#1 for streaming:* https://geni.us/sony-camera
→ Lens for streaming:* https://geni.us/sony-lense
→ Connect Camera#1 to PC:* https://geni.us/cam-link
→ Keyboard:* https://geni.us/mech-keyboard
→ Old Microphone:* https://geni.us/mic-at2020usb

US Store Front:* https://www.amazon.com/shop/liveoverflow

=[ ❤️ Support ]=

→ per Video: Patreon: liveoverflow
→ per Month: @liveoverflow

=[ 🐕 Social ]=

→ Twitter: Twitter: LiveOverflow
→ Website: https://liveoverflow.com/
→ Subreddit: Reddit: LiveOverflow
→ Facebook: Facebook: LiveOverflow

=[ 📄 P.S. ]=

All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

#ReverseEngineering #CTF
7 سال پیش در تاریخ 1396/01/04 منتشر شده است.
62,355 بـار بازدید شده
... بیشتر