Writeup: REdo 2
REDo2 ended up being worth 152 points in the Reverse Engineering category in TAMU CTF 2022!
Step 1: I much rather read Pseudo-C I can read assembly and have in the past when my disassemblers have lost track of what is happening or if I am in gdb, but I’ve been spoiled by Binary Ninja and Ghidra so why not just assemble the code 👀
If you run
gcc -g -m32 -c redo2.