Medium Live

Jumper

60 points

137 Solves

Reverse Engineering

Medium

thekidofarcrania moderator badge

Community Rating: 4.19 / 5

Hey, I have this simple assembly code: https://mega.nz/#!SPwVzbQD!oSwwdjhel_hhJ6DzlWYPJk4O5mShUZbWMaPtC1amXlA. I need YOUR help. On a particular instruction (address 0x80484e2) I want to know where the call instruction is jumping to (i.e. the address that we are jumping to) (If the user inputs in 'jump'). Specify your answer as a hex number prefixed with '0x', with no leading zeros. Ex. 0x1234. Good luck!

First 10 Solvers

Rank Username
1 kronos
2 95570e9a
3 grado
4 Bgf9Khpj
5 lonelyboyz
Rank Username
6 kolibrik7
7 0xcpu
8 tenchijin
9 xaxaxa
10 Yeraisci

  • Sr_Ciruelo

    Protected

    [REDACTED] This comment is only shown to users who have solved this challenge.

    • thekidofarcrania moderator badge

      yes you are correct, but I would suggest checking the man page for fgets ;)

      • Sr_Ciruelo

        Thank you for your comment really helped me a lot

  • Fl4Gg3R

    Protected

    [REDACTED] This comment is only shown to users who have solved this challenge.

    • SpongeBoob ctflearn++ badge

      not to spoil too much: consider how 'jump' maps into little endian dword ;)

  • Fl4Gg3R

    F***ing finally solved it. Really satisfying when i finally solve the challenge.

  • dachosen1

    Super fun challenge. If assembly is something you struggle with, this is a good one to learn from.

    • dachosen1

      It's also good if you struggle with focusing on the instructions of the challenge itself!

  • cyberman184

    Protected

    [REDACTED] This comment is only shown to users who have solved this challenge.

  • nierusek

    Protected

    [REDACTED] This comment is only shown to users who have solved this challenge.

    • nierusek

      Note to everyone: apparently you can't see your own protected comments if you didn't solve.

    • nierusek

      Protected

      [REDACTED] This comment is only shown to users who have solved this challenge.