mirror of
https://github.com/aljazceru/securedorg.github.io.git
synced 2025-12-19 15:14:18 +01:00
Update re102_section4.md
This commit is contained in:
@@ -60,7 +60,7 @@ Cryptographic algorithms are often grouped into two major categories: symmetric
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
For every subkey K in this algorithm, it has to loop through each K to XOR and Swap. In the disassembly you will be able to see this looping, incrementing, and swapping action going on. Now let’s look at sub_45B5AC.
|
For every subkey K in this algorithm, it has to loop through each K to XOR and Swap. In the disassembly you will be able to see this looping, incrementing, and swapping action going on. Now let’s look at `sub_45B5AC`.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@@ -84,4 +84,4 @@ In the beginning of this section, it mentioned you need to be suspicious of NOP
|
|||||||
|
|
||||||
The next subsection will go over identifying which cryptographic algorithm this malware is using.
|
The next subsection will go over identifying which cryptographic algorithm this malware is using.
|
||||||
|
|
||||||
[Section 3.2 <- Back](https://securedorg.github.io/RE102/section3.2) | [Next -> Section 4.1](https://securedorg.github.io/RE102/section4.1)
|
[Section 3.2 <- Back](https://securedorg.github.io/RE102/section3.2) | [Next -> Section 4.1](https://securedorg.github.io/RE102/section4.1)
|
||||||
|
|||||||
Reference in New Issue
Block a user