Update halifax notes with notes.

This commit is contained in:
Val 2023-01-23 19:27:53 -06:00
parent 5176ed751c
commit dd08de1ccf

View File

@ -9,7 +9,7 @@
Hash appears random each time Hash appears random each time
Hash is given prior to user input Hash is given prior to user input
Approach: ### Approach:
Hash each individual byte of SRAM, and break the exfiltrated hashes Hash each individual byte of SRAM, and break the exfiltrated hashes
sha256(8 bit message) ~ identified by first 20 bits sha256(8 bit message) ~ identified by first 20 bits
smallest we can do on this mcu is 6 nybbles (24 bits) smallest we can do on this mcu is 6 nybbles (24 bits)
@ -26,3 +26,7 @@ number of distinct values in all_hashes: 256
00000020: c304 c8bc 2b0c 5820 4a71 3230 5cfc 47bd ....+.X Jq20\.G. 00000020: c304 c8bc 2b0c 5820 4a71 3230 5cfc 47bd ....+.X Jq20\.G.
00000030: 4581 1f47 ee8a 1ddc 7806 bc35 6048 16c3 E..G....x..5`H.. 00000030: 4581 1f47 ee8a 1ddc 7806 bc35 6048 16c3 E..G....x..5`H..
``` ```
### Problems abound.
The payload doesn't work. I'm not sure how to find out what args 0x41 expects..?
Neither stuck_pixel nor Pokemod can either. This challenge is a doozy.