Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Amazing article! In case the author sees this, it'd be great if the author can deep dive into how he "found the right place" in finding the correct breakpoint to produce the decrypted message. It seems to me that if you're able to do this there's a lot of interesting things one could do.


Probably just painfully stepping through the debugger.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: