Skip to content

Commit 0b87d37

Browse files
committed
fix angr link
1 parent c652ede commit 0b87d37

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

_posts/writeups/2025/2025-06-15-cddc-2025-finals.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -624,7 +624,7 @@ From IDA, we can tell that the first `check_flag` function is at `0x49773` and t
624624
Initially, I thought of 3 ways to do this
625625

626626
1. Brute-force character by character. We can tell if a character is correct if we have more code coverage / more code is executed.
627-
2. We can use a symbolic execution engine like [angr](angr.io) to try and solve the constraints of our input.
627+
2. We can use a symbolic execution engine like [angr](https://angr.io) to try and solve the constraints of our input.
628628
3. We can write a parser to read the assembly instructions and convert it into equations that we can solve using [z3](https://github.com/Z3Prover/z3).
629629

630630
Option 1 would be difficult for me beacuse I am not familiar with any instrumentation engines like [pintool](https://www.intel.com/content/www/us/en/developer/articles/tool/pin-a-dynamic-binary-instrumentation-tool.html). Setting breakpoints by using a debugger might be too slow.

0 commit comments

Comments
 (0)