Too Long; Didn't Read
The Reverse Engineering Challenge is the first ever written up on a reverse engineering challenge. The challenge aims to get the flag from the binary (ELF) file. It has a check and goodboy function that looks suspicious that will need further investigation on it. The code snippet on the left is the check function. It was very obvious that the value of eax register will compare with the value in the [local_8h] also known as ebp-0x08h to continue with its process. If the compared value is not the same, it will goes to badboy function in which the program will terminated.