From 9545e7e75dc073c0b0c1dee4ff6b50aeefd287a7 Mon Sep 17 00:00:00 2001 From: "SECURED.ORG" Date: Tue, 21 Nov 2017 17:13:41 -0800 Subject: [PATCH] Update challenge4.md --- flareon4/challenge4.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/flareon4/challenge4.md b/flareon4/challenge4.md index 8f785c2..5f5c155 100644 --- a/flareon4/challenge4.md +++ b/flareon4/challenge4.md @@ -18,7 +18,7 @@ The first part of the start function is the biggest hint. It is looking for the ## Structure ## -![alt text](https://securedorg.github.io/flareon4/images/ch4_diagram.png "diagram") +![alt text](https://securedorg.github.io/flareon4/images/ch4_diagram.png "ch4 diagram") The binary is actually performing typical malware-like behaviors that I see all the time: @@ -92,4 +92,4 @@ for i in range(len(string)): print answer ``` -[Challenge 3 <- Back](https://securedorg.github.io/flareon4/challenge3) | [Next -> Challenge 5](https://securedorg.github.io/flareon4/challenge5) \ No newline at end of file +[Challenge 3 <- Back](https://securedorg.github.io/flareon4/challenge3) | [Next -> Challenge 5](https://securedorg.github.io/flareon4/challenge5)