easyRE1 Writeup
Analysis
拿到附件用IDA打开F5出伪代码
int __cdecl main(int argc, const char **argv, const char **envp)
{
char s[256]; // [esp+1Ch] [ebp-10Ch] BYREF
unsigned int v5; // [esp+11Ch] [ebp-Ch]
v5 = __readgsdword(0x14u);
puts("What is the password?");
gets(s);
if ( !strcmp(s, "the password") )
puts("FLAG:db2f62a36a018bce28e46d976e3f9864");
else
puts("Wrong!!");
return 0;
}
FLAG: flag{db2f62a36a018bce28e46d976e3f9864}
easyRE1 Writeup
https://zer0ptr.github.io/2025/08/26/adworld-easyRE/