microcorruption | my solutions for microcorruption
kandi X-RAY | microcorruption Summary
kandi X-RAY | microcorruption Summary
my solutions for microcorruption
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
- Hashes the given username .
- Force a username to a given bin .
- Return a hex representation of a string
- Return the endian of an address
- Convert a hex string to a string .
- Return signed endian representation of an address .
- Convert UNIX command to command .
- Convert hex to command .
- Convert an address to a hex string .
microcorruption Key Features
microcorruption Examples and Code Snippets
Community Discussions
Trending Discussions on microcorruption
QUESTION
in the cusco challenge of microcorruption CTF I noticed that after line 453a the sp adds 16 to the sp value while on line 4476 it adds only 8. why does it happen?
by the way if there are easier challenges you know of to practice my reverse engineering skills i would really appreciate a link thanks!
...ANSWER
Answered 2021-Oct-07 at 14:15Hexadecimal. 0x10 is 16; 0x8 is 8.
QUESTION
i am currently working to solve the stage Hanoi in the Microcorruption CTF. This CTF focusses on the MSP430 Family (RISC, 16Bit).
I stumbled across the following lines:
...ANSWER
Answered 2020-Dec-22 at 23:14As pointed out in the coments by Peter Cordes, my initial thought is correct. (Even though the wording is off)
The value stored in the memoryaddress, which is equal to the sum of the value stored in r4 plus the offset -4 is decremented by the register plus -4 (offset) and stored in r15. That's it really.
Example:
If
r4 = 0x43FC and 0x43F8 = 0xAB
The instruction
QUESTION
I'm trying to understand the first microcorruption challenge.
I want to ask about the first line of the main function.
Why would they add that address to the stack pointer?
...ANSWER
Answered 2020-Jan-10 at 21:44This looks like a 16-bit ISA1, otherwise the disassembly makes no sense.
0xff9c
is -100 in 16-bit 2's complement, so it looks like this is reserving 100 bytes of stack space for main
to use. (Stacks grow downward on most machines). It's not an address, just a small offset.
See MSP430 Assembly Stack Pointer Behavior for a detailed example of MSP430 stack layout and usage.
Footnote 1: MSP430 possibly? http://mspgcc.sourceforge.net/manual/x82.html it's a 16-bit ISA with those register names, and those mnemonics, and I think its machine code uses variable-length 2 or 4 byte instructions.
It's definitely not ARM; call
and jmp
are not ARM mnemonics; that would be bl
and b
. Also, ARM uses op dst, src1, src2
syntax, while this disassembly uses op src, dst
.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install microcorruption
You can use microcorruption like any standard Python library. You will need to make sure that you have a development environment consisting of a Python distribution including header files, a compiler, pip, and git installed. Make sure that your pip, setuptools, and wheel are up to date. When using pip it is generally recommended to install packages in a virtual environment to avoid changes to the system.
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page