Skip to content

Commit 22d9b35

Browse files
authored
Update README.md
1 parent 1d5d520 commit 22d9b35

File tree

1 file changed

+14
-1
lines changed

1 file changed

+14
-1
lines changed

corrupt/README.md

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,20 @@
2020

2121
- With trial and error, 2 bytes in the input are used in decoding the hex array, which are the 19th and 20th byte appended to the input string
2222

23-
- Manual labor of translating the instructions within the binary shows the 19th byte used as XOR, 20th byte used as SUB
23+
- Translating the hexdump of the binary shows one byte used as XOR, and another byte used as SUB
24+
25+
```
26+
51: c0 80 cd db 31 83 8a rol BYTE PTR [eax-0x7cce2433],0x8a
27+
58: 01 30 add DWORD PTR [eax],esi
28+
5a: 00 20 add BYTE PTR [eax],ah
29+
5c: 0d 8a 01 88 00 or eax,0x88018a
30+
61: 20 c8 and al,cl
31+
63: 30 15 8a 01 87 00 xor BYTE PTR ds:0x87018a,dl
32+
69: 20 d0 and al,dl
33+
6b: 28 83 89 02 24 00 sub BYTE PTR [ebx+0x240289],al
34+
71: 20 83 43 29 fb de and BYTE PTR [ebx-0x2104d6bd],al
35+
77: 75 06 jne 0x7f
36+
```
2437

2538
- By brute forcing the pattern, knowing its an asm challenge and the flag string ending with '\n', only one flag is found
2639

0 commit comments

Comments
 (0)