Reverseme – very very easy Linux
December 28, 2007 Leave a comment
This would probably be a good place to start if you’ve never reversed anything before. Too easy for my taste though, and I’m just a beginner.
To try it, see http://crackmes.de/users/cyrex/linux_crackme/
With an objdump, you can see the strcmp is called right after scanf asks for the password.
The password is hard coded. It is pushed from 0x80486a3. Revealing what it is is as simple as starting up gdb and typing x/s 0x80486a4. It is also revealed with the strings command or a hexdump.