IOLI crackme0x02


https://github.com/Maijin/radare2-workshop-2015/tree/master/IOLI-crackme/bin-linux


Check the file.


Test the program out.


Analyze the program in GDB.

There are two ways to find the password.

  • The lines inside the orange box can be equated to give us an answer.
  • Set a breakpoint at the cmp line and print out the variable for [ebp-0xc]

We can also analyze the program in Ghidra.

Assembly:

Decompile:

  • Password is hard coded
  • User Input is compared with password

Test the password

Create a website or blog at WordPress.com