Reverse Engineering
Challenge
Link
WHOMEGALUL (663 pts)
Description
Solution
__int64 main__main()
{
__int64 v0; // rdx
char *v2; // [rsp+0h] [rbp-60h]
int v3; // [rsp+8h] [rbp-58h]
int v4; // [rsp+Ch] [rbp-54h]
__int64 v5; // [rsp+10h] [rbp-50h]
__int64 v6; // [rsp+18h] [rbp-48h]
char v7; // [rsp+20h] [rbp-40h]
char v8; // [rsp+30h] [rbp-30h]
char v9; // [rsp+40h] [rbp-20h]
__int64 v10; // [rsp+50h] [rbp-10h]
__int64 v11; // [rsp+58h] [rbp-8h]
v5 = os__hostname();
v6 = v0;
memmove_plt(&v7, &v5, 16LL);
v2 = L_1261;
v3 = 53;
v4 = 1;
memmove_plt(&v8, &v2, 16LL);
memmove_plt(&v9, &v7, 32LL);
main__Credential_validate(&v9);
return println(v10, v11);
}
WeirdChamp (691 pts)
Description
Solution
Last updated