Microcorruption challenge II

Here we go with the second round of Microcorruption writeups. Reykjavik (35 points). Lockitall LOCKIT PRO r a.03 ______________________________________________________________________ User Manual: Lockitall LockIT Pro, rev a.03 ______________________________________________________________________ OVERVIEW – Lockitall developers have implemented military-grade on-device encryption to keep the password secure. – This lock is…

Microcorruption challenge I

Some days ago, I found a link to Matasano’s Microcorruption Challenge. This is a set of challenges focused mainly on Reversing and Exploiting of embedded devices. Something I found really cool about this challenge was that, even if it’s a RE challenge, you don’t need…

SetStatusFlags(temp);

While writing the previous post, I came up with a curious obstacle I would like to share. I had to analyze the instruction scasb and, since I didn’t know exactly how it worked, I ended up checking the Intel manual, where I read the following:…