SRE/01-VeryEasy1/VE1.txt

14 lines
486 B
Plaintext
Raw Normal View History

2025-02-24 16:05:42 +01:00
1. What compiler was used to build this executable?
GCC
2. What is the target platform for this executable?
x86_64
3. Is this executable linked statically or dynamically?
dynamically linked
4. What kind of reverse-engineering information is still embedded in this executable?
?
5. What is the secret password hardcoded into this executable? You need to email this value to pascal+sre25@mod-p.ch before Feb 24th, 2025, 12h00 CET to validate this lab and receive 1 point.
+3kfRmlG1rqb