- The binary "reverse-challenge" adopts a few anti reverse engineering techniques to protect an encrypted secret. What's the decrypted secret (hint: it's part of the input you provide and it is not the output the program produces; moreover, the decrypted secret need not to be a meaningful word)?
SHARE
TWEET
Untitled
a guest
May 25th, 2015
337
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
RAW Paste Data
