Update halifax notes with notes.

This commit is contained in:
Val 2023-01-23 19:27:53 -06:00
parent 5176ed751c
commit dd08de1ccf

View File

@ -9,7 +9,7 @@
Hash appears random each time
Hash is given prior to user input
Approach:
### Approach:
Hash each individual byte of SRAM, and break the exfiltrated hashes
sha256(8 bit message) ~ identified by first 20 bits
smallest we can do on this mcu is 6 nybbles (24 bits)
@ -26,3 +26,7 @@ number of distinct values in all_hashes: 256
00000020: c304 c8bc 2b0c 5820 4a71 3230 5cfc 47bd ....+.X Jq20\.G.
00000030: 4581 1f47 ee8a 1ddc 7806 bc35 6048 16c3 E..G....x..5`H..
```
### Problems abound.
The payload doesn't work. I'm not sure how to find out what args 0x41 expects..?
Neither stuck_pixel nor Pokemod can either. This challenge is a doozy.