Practical Reverse Engineering Exercise Solutions: Page 79 / Exercise 6
Exercise 6 on page 79 of the book Practical Reverse Engineering specifies the following ARM disassembly of a function called mystery6
:
|
|
Due to the presence of 16 bit instructions, instructions having the .W
suffix and function prologue and epilogue with PUSH
and POP
respectively, we are dealing with code in Thumb state.