pwneasy
QQQ
spbctf
Task: find the address of the instruction that writes a value to a specific memory buffer in a VM-like binary. Solution: use static disassembly analysis (objdump) to trace store instructions and identify the "mov dword ptr [rax], ecx" at address 0x400e88 that writes to the target buffer.
$ ls tags/ techniques/
disassembly_analysisinstruction_tracingmemory_write_identification
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]