radare2 -d ./crackme4 password
[0x7faf1ff3c090]> aa
[0x7faf1ff3c090]> afl
[0x7faf1ff3c090]> pdf @sym.get_pwd
[0x7faf1ff3c090]> db 0x00400678
[0x7faf1ff3c090]> dc
[0x00400678]> pdf @sym.get_pwd
[0x00400678]> px @rbp-0x4
my_m0r3_secur3_pwd
Task 5 Crackme5
What will be the input of the file to get output Good game ?
What is the input ?
chmod +x crackme5
./crackme5
radare2 -d ./crackme5
aaa
afl
pdf @main
db 0x0040082c
dc
px @rsi
OfdlDSA|3tXb32~X3tX@sX`4tXtz
Task 6 Crackme6
Analyze the binary for the easy password
What is the password ?
radare2 -d ./crackme6
aaa
afl
pdf @main
pdf @sym.compare_pwd
pdf @sym.my_secure_test
db 0x004006e1
0x31
0x33
0x33
0x37
0x5f
0x70
0x77
0x64