Basic Exploration
shell@shell:~/github/r2angr/docs/challenges$ r2 00_angr_find
-- Use rarun2 to launch your programs with a predefined environment.
[0x08048450]> aaa
[x] Analyze all flags starting with sym. and entry0 (aa)
[x] Analyze function calls (aac)
[x] Analyze len bytes of instructions for references (aar)
[x] Check for objc references
[x] Check for vtables
[x] Type matching analysis for all functions (aaft)
[x] Propagate noreturn information
[x] Use -AA or aaaa to perform additional experimental analysis.│ 0x0804865c e86ffdffff call sym.imp.strcmp ; int strcmp(const char *s1, const char *s2)
│ 0x08048661 83c410 add esp, 0x10
│ 0x08048664 85c0 test eax, eax
│ ┌─< 0x08048666 7412 je 0x804867a
│ │ 0x08048668 83ec0c sub esp, 0xc
│ │ 0x0804866b 6833870408 push str.Try_again. ; 0x8048733 ; "Try again." ; const char *s
│ │ 0x08048670 e88bfdffff call sym.imp.puts ; int puts(const char *s)
│ │ 0x08048675 83c410 add esp, 0x10
│ ┌──< 0x08048678 eb10 jmp 0x804868a
│ ││ ; CODE XREF from main @ 0x8048666
│ │└─> 0x0804867a 83ec0c sub esp, 0xc
│ │ 0x0804867d 6860870408 push str.Good_Job. ; 0x8048760 ; "Good Job." ; const char *s
│ │ 0x08048682 e879fdffff call sym.imp.puts ; int puts(const char *s)
│ │ 0x08048687 83c410 add esp, 0x10
│ │ ; CODE XREF from main @ 0x8048678
│ └──> 0x0804868a b800000000 mov eax, 0
│ 0x0804868f 8b4df4 mov ecx, dword [canary]Last updated