###### tags: `DarkCTF` `Rev` # Rev/so_much ### description - strcmp printf - File: https://mega.nz/file/mslUUbQQ#shM3HzjlqdytJWpKd6RH0qP-f7jiu0XknMoui3-11nI - 首先strings so_much查看 -  - 沒有可用的文字 - `disassemble main`解析 -  - 我們發現call_flag後面有第一個cmp - `b *0x0000555555555202`下斷點跳上去 -  - 他做cmp,並把要比較的值(flag)也印出來了 - flag:darkCTF{w0w_s0_m4ny_funct10ns}
×
Sign in
Email
Password
Forgot password
or
By clicking below, you agree to our
terms of service
.
Sign in via Facebook
Sign in via Twitter
Sign in via GitHub
Sign in via Dropbox
Sign in with Wallet
Wallet (
)
Connect another wallet
New to HackMD?
Sign up