PlaidCTF 2017 - no_mo_flo writeup (RE)

from blog LSE Blog, | ↗ original
Can you go with the flow? no_mo_flo is a reverse engineering challenge from this year’s PlaidCTF. It’s a 64-bit executable that reads 32 characters from stdin, and tells you if this is the correct flag or not (classic). Opening it in IDA reveals that it takes the input and breaks it into two 16 bytes buffers: for ( i = 0; i...