1 00:00:00,240 --> 00:00:06,660 I read this in previous, we have written the circle and we have executed a decree where we know that 2 00:00:06,660 --> 00:00:08,350 it's good again to see the output. 3 00:00:09,000 --> 00:00:13,020 So now we have got the shares shall. 4 00:00:15,590 --> 00:00:18,350 Now, this binary contains the code. 5 00:00:18,680 --> 00:00:29,320 Now let's use a tool called Object to see that this is some refinement to an object dump minus the disassemble 6 00:00:31,120 --> 00:00:31,280 it. 7 00:00:32,100 --> 00:00:41,260 We know this shows us some record, but it shows in 80 this index we're going to change it to into. 8 00:00:54,170 --> 00:01:00,170 So I'm going to change your tone and we can see the exact same record we have written in our program. 9 00:01:01,250 --> 00:01:10,010 OK, this is the code for these instructions to say that we want C0 the zip code doesn't know how to 10 00:01:10,010 --> 00:01:13,310 extract, only these are convinced we need to take Google. 11 00:01:19,210 --> 00:01:19,380 OK, 12 00:01:23,610 --> 00:01:25,230 so go to this website. 13 00:01:27,950 --> 00:01:31,370 And as you can see here, there is a. 14 00:01:34,050 --> 00:01:39,510 Abdul Tump, come in and what do you need to copy and paste it in here? 15 00:01:41,720 --> 00:01:48,820 Now, in this program, we were right ethically, because we need to get the character of the lexically 16 00:01:48,830 --> 00:01:49,130 file. 17 00:02:00,040 --> 00:02:07,870 So we have got successfully a from the boundary, and you can see there are no lights and no can just 18 00:02:07,870 --> 00:02:12,430 simply see from the eye that there are no zero zero bolts. 19 00:02:13,120 --> 00:02:15,370 Also, you can do you can, Echolls. 20 00:02:21,330 --> 00:02:22,710 And you can see griper. 21 00:02:25,470 --> 00:02:31,850 Six zero zero to find any Norbert's, so there are no nanobots, OK, that's fine. 22 00:02:33,180 --> 00:02:39,720 We have successfully got extracted the Chalco from the battery and we can answer to this Chalco using 23 00:02:39,720 --> 00:02:40,440 a subprogram. 24 00:02:48,260 --> 00:02:54,560 So in the Google search program, a record and go to this fledgling top. 25 00:02:56,710 --> 00:03:05,440 And they realize this is the core and we need to place the circle in this character area, and then 26 00:03:05,920 --> 00:03:17,080 it will prince the circle and then it will create a pointer to this character and that pointer will 27 00:03:17,080 --> 00:03:25,570 be casted into the integer and dysfunction, execute this code that it starting at this function. 28 00:03:26,230 --> 00:03:33,070 So this code is treated as a function and it gets executed when we call the return function. 29 00:03:34,330 --> 00:03:40,270 So you guys, if you scroll down, they have already mentioned how to execute in the 64 bit machine 30 00:03:40,810 --> 00:03:43,180 or to introduce you need to copy this command. 31 00:03:46,720 --> 00:03:55,760 OK, I have already copied the C file, so I said, no, no, Chalco, I was that that siefer record 32 00:03:56,050 --> 00:03:56,470 Scottish. 33 00:04:03,920 --> 00:04:07,820 Now we can build the circle and we need to push our circle. 34 00:04:10,360 --> 00:04:11,210 Oh, I'm sorry. 35 00:04:19,240 --> 00:04:21,580 So we need to copy this circle. 36 00:04:30,130 --> 00:04:31,270 And pasted in here. 37 00:04:34,100 --> 00:04:40,430 And with the semicolon, that's kind of everything in the seat, I need to seal this file. 38 00:04:42,710 --> 00:04:44,930 And OK, we need to copy this. 39 00:04:46,280 --> 00:04:54,620 OK, this one, sorry now, but we're going to lose we are telling the DCC compared to compare our C-code 40 00:04:54,890 --> 00:04:57,760 and create an output in the Shulem. 41 00:04:57,800 --> 00:05:02,070 And then we are disabling some security mitigations like stack product. 42 00:05:02,360 --> 00:05:07,040 It could stack and not bite and we are finally telling the truth. 43 00:05:07,190 --> 00:05:15,290 So these are some stark predictions to avoid this, Stackpole, for all of us, and also not to educate 44 00:05:15,290 --> 00:05:16,130 any corners. 45 00:05:17,180 --> 00:05:22,950 So we are just disabling those security mitigations in order to test our circle knowledge. 46 00:05:23,000 --> 00:05:23,880 Copy this one. 47 00:05:24,500 --> 00:05:30,440 And what we're going to change is we are going to change this to Chalco Tester. 48 00:05:30,480 --> 00:05:30,830 That's. 49 00:05:40,770 --> 00:05:43,260 And OK, I can be an shall. 50 00:05:46,400 --> 00:05:54,350 Could there is a warning we can take the first one, so since it's warning, we can ignore that now 51 00:05:54,350 --> 00:05:59,710 I'm going to take the cell and they reverse it also tells us to circle and different effect. 52 00:05:59,720 --> 00:06:00,630 And we got the cell. 53 00:06:01,130 --> 00:06:05,720 So in this way, this is very simple program to test our circle. 54 00:06:08,480 --> 00:06:13,280 And we can also test any Shergar in this subprogram.