Reverse Engineering Crackme challenge resolution with Radare2 (crackme0x01) February 23, 2017 by Pepe 0 Comments Here I check the password in the source code. It’s also possible to view how it’s the requested (password) string stored in memory. Tags: CTF Radare Reverse Engineering Post navigation ← Crackme with Radare2 (crackme0x00a)Crackme challenge resolution with Radare2 (crackme0x02) → Author Pepe