diff --git a/RE102/re102_section4.md b/RE102/re102_section4.md index 8a5b43c..a90195e 100644 --- a/RE102/re102_section4.md +++ b/RE102/re102_section4.md @@ -60,7 +60,7 @@ Cryptographic algorithms are often grouped into two major categories: symmetric ![alt text](https://securedorg.github.io/RE102/images/Section4_cipher.png "Section4_cipher") -For every subkey K in this algorithm, it has to loop through each K to XOR and Swap. In the disassembly you will be able to see this looping, incrementing, and swapping action going on. Now let’s look at sub_45B5AC. +For every subkey K in this algorithm, it has to loop through each K to XOR and Swap. In the disassembly you will be able to see this looping, incrementing, and swapping action going on. Now let’s look at `sub_45B5AC`. ![alt text](https://securedorg.github.io/RE102/images/Section4_looping.png "Section4_looping") @@ -84,4 +84,4 @@ In the beginning of this section, it mentioned you need to be suspicious of NOP The next subsection will go over identifying which cryptographic algorithm this malware is using. -[Section 3.2 <- Back](https://securedorg.github.io/RE102/section3.2) | [Next -> Section 4.1](https://securedorg.github.io/RE102/section4.1) \ No newline at end of file +[Section 3.2 <- Back](https://securedorg.github.io/RE102/section3.2) | [Next -> Section 4.1](https://securedorg.github.io/RE102/section4.1)