Skip to main content

Posts

Showing posts with the label assembly-0

PicoCTF 2018 – Reverse Engineering - assembly 0

PicoCTF 2018 – Reverse Engineering   - assembly 0 Objective: What does asm0(0xb6,0xc6) return? Submit the flag as a hexadecimal value (starting with '0x'). NOTE: Your submission for this question will NOT be in the normal flag format. Source [1]   located in the directory at /problems/assembly-0_0_5a220faedfaf4fbf26e6771960d4a359. Hints: (1)     basical assembly tutorial [2]   (2) assembly registers [3] Source: .intel_syntax noprefix .bits 32                 .global asm0 asm0:                 push       ebp                                                                         mov        ebp,esp                 mov        eax,DWORD PTR [ebp+0x8]                 mov        ebx,DWORD PTR [ebp+0xc]                 mov        eax,ebx                 mov        esp,ebp                 pop         ebp                         ret Solution: So   I spent about an hour watching youtube videos to try and understand assembly language