mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-21 20:23:18 +00:00
GitBook: [master] one page and one asset modified
This commit is contained in:
parent
06fbf24691
commit
5312a8826c
2 changed files with 9 additions and 0 deletions
BIN
.gitbook/assets/image (612).png
Normal file
BIN
.gitbook/assets/image (612).png
Normal file
Binary file not shown.
After Width: | Height: | Size: 3.7 KiB |
|
@ -217,6 +217,15 @@ And [install keystone](https://github.com/keystone-engine/keystone/blob/master/d
|
|||
|
||||
If you are playing a **CTF, this workaround to find the flag** could be very useful: [https://dustri.org/b/defeating-the-recons-movfuscator-crackme.html](https://dustri.org/b/defeating-the-recons-movfuscator-crackme.html)
|
||||
|
||||
## Rust
|
||||
|
||||
To find the **entry point** search the functions by `::main` like in:
|
||||
|
||||
![](../../.gitbook/assets/image%20%28612%29.png)
|
||||
|
||||
In this case the binary was called authenticator, so it's pretty obvious that this is the interesting main function.
|
||||
Having the **name** of the **functions** being called, search for them on the **Internet** to learn about their **inputs** and **outputs**.
|
||||
|
||||
## Delphi
|
||||
|
||||
For Delphi compiled binaries you can use [https://github.com/crypto2011/IDR](https://github.com/crypto2011/IDR)
|
||||
|
|
Loading…
Reference in a new issue