WASM introduction
Root-me challenge: Do you know WebAssembly? Find the password that validates this crackme.
A Web assembly file is loaded: http://challenge01.root-me.org/cracking/ch41/index.wasm.
Decompile
index.wasm
with tools from the WebAssembly Binary Toolkit.Analysis
Look at
$check_password
code. Password is MD5 hashed.At the end of the file some constant values are defined.
Use, for example, the hashes website to decrypt.
Enter the decrypted password in the site to get the flag.