mirror of
https://github.com/aljazceru/securedorg.github.io.git
synced 2025-12-19 07:04:20 +01:00
Update re102_section4.md
This commit is contained in:
@@ -60,7 +60,7 @@ Cryptographic algorithms are often grouped into two major categories: symmetric
|
||||
|
||||

|
||||
|
||||
For every subkey K in this algorithm, it has to loop through each K to XOR and Swap. In the disassembly you will be able to see this looping, incrementing, and swapping action going on. Now let’s look at sub_45B5AC.
|
||||
For every subkey K in this algorithm, it has to loop through each K to XOR and Swap. In the disassembly you will be able to see this looping, incrementing, and swapping action going on. Now let’s look at `sub_45B5AC`.
|
||||
|
||||

|
||||
|
||||
@@ -84,4 +84,4 @@ In the beginning of this section, it mentioned you need to be suspicious of NOP
|
||||
|
||||
The next subsection will go over identifying which cryptographic algorithm this malware is using.
|
||||
|
||||
[Section 3.2 <- Back](https://securedorg.github.io/RE102/section3.2) | [Next -> Section 4.1](https://securedorg.github.io/RE102/section4.1)
|
||||
[Section 3.2 <- Back](https://securedorg.github.io/RE102/section3.2) | [Next -> Section 4.1](https://securedorg.github.io/RE102/section4.1)
|
||||
|
||||
Reference in New Issue
Block a user