First of all, sorry if my english is bad, it is not my natural language.
I have no experience in reverse engineering yet. So, i am very confused with my first task in University regarding to this topic.
The task is to find a password for a binary. The program asks for user inputs, transfroms it and compares that input to a hardcoded value(i don't know the length of it). I'm trying to find this value.
I'm sure, i have found the memcmp command where the values are compared. I know that memcmp gets these values as input parameters but i don't know where from.(Stack or explicit registers...)
Here is a section of the code before it gets to memcmp:
0x10a84 movw r3, #3472 ; 0xd90
0x10a88 movt r3, #2
0x10a8c ldr r1, [r3]
0x10a90 ldr r3, [r11, #-16]
0x10a94 lsl r3, r3, #2
0x10a98 mov r2, r3
0x10a9c ldr r0, [r11, #-20] ; 0xffffffec
0x10aa0 bl 0x10540 <memcmp@plt>
0x10aa4 mov r3, r0
0x10aa8 cmp r3, #0
0x10aac bne 0x10ac0
I'd very thankful for any help.