# See the commands for Lecture 4 for the basics: "p04_commands.txt". # We download "secret.zip" and uncompress it in a new directory. mkdir tutorial_2 cd tutorial_2 curl -O https://www.poirrier.ca/courses/softeng/ex/secret.zip # or # wget https://www.poirrier.ca/courses/softeng/ex/secret.zip unzip secret.zip # Let us display the contents of "secret": hexdump -C secret | less # Let us display dynamic linking information: objdump -p secret | less # or # readelf -a secret | less # Optionally, we can also disassemble the code # (see Tutorial 2 errata for how to interpret this) objdump -M intel -d secret | less # For the mistery app, we can use the "strings" command strings app | less # or strings app > strings.txt # This commands finds all ASCII strings in the file # and displays just them. In the output we find, for # example, this: # # # # ... which suggests that the app is WordPad