Medium Live


60 points

64 Solves

Reverse Engineering


thekidofarcrania moderator badge

Community Rating: 4.33 / 5

Hey, I have this simple assembly code:!SPwVzbQD!oSwwdjhel_hhJ6DzlWYPJk4O5mShUZbWMaPtC1amXlA. I need YOUR help. On a particular instruction (address 0x80484e2) I want to know where the call instruction is jumping to (i.e. the address that we are jumping to) (If the user inputs in 'jump'). Specify your answer as a hex number prefixed with '0x', with no leading zeros. Ex. 0x1234. Good luck!

First 10 Solvers

Rank Username
1 kronos
2 95570e9a
3 grado
4 Bgf9Khpj
5 atom_rs
Rank Username
6 kolibrik7
7 0xcpu
8 tenchijin
9 xaxaxa
10 Yeraisci

  • Sr_Ciruelo


    [REDACTED] This comment is only shown to users who have solved this challenge.

    • thekidofarcrania moderator badge

      yes you are correct, but I would suggest checking the man page for fgets ;)

      • Sr_Ciruelo

        Thank you for your comment really helped me a lot