easyRE1 Writeup

Analysis

拿到附件用IDA打开F5出伪代码

int __cdecl main(int argc, const char **argv, const char **envp)
{
  char s[256]; // [esp+1Ch] [ebp-10Ch] BYREF
  unsigned int v5; // [esp+11Ch] [ebp-Ch]

  v5 = __readgsdword(0x14u);
  puts("What is the password?");
  gets(s);
  if ( !strcmp(s, "the password") )
    puts("FLAG:db2f62a36a018bce28e46d976e3f9864");
  else
    puts("Wrong!!");
  return 0;
}

FLAG: flag{db2f62a36a018bce28e46d976e3f9864}


easyRE1 Writeup
https://zer0ptr.github.io/2025/08/26/adworld-easyRE/
Author
zer0ptr
Posted on
August 26, 2025
Licensed under