pwneasy

QQQ

spbctf

Task: find the address of the instruction that writes a value to a specific memory buffer in a VM-like binary. Solution: use static disassembly analysis (objdump) to trace store instructions and identify the "mov dword ptr [rax], ecx" at address 0x400e88 that writes to the target buffer.

$ ls tags/ techniques/
disassembly_analysisinstruction_tracingmemory_write_identification

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]