In this video, we explore a simple yet powerful reverse engineering technique using x64dbg to manipulate program flow by modifying CPU flags.
Specifically, we demonstrate how to bypass or reverse a conditional jump (JZ/JNZ) by toggling the Zero Flag (ZF) in an x86/x64 application. This is a common trick used in debugging, crackme challenges, and binary analysis.
🔍 What you’ll learn:
⭐ How conditional jumps (JZ / JNZ) depend on CPU flags
⭐ Role of the Zero Flag (ZF) in branching
⭐ Using x64dbg to inspect and modify flags in real-time
⭐ Forcing execution paths without patching the binary
💡 This technique is extremely useful for:
⭐ Reverse engineering beginners
⭐ Crackme / CTF challenges
⭐ Understanding low-level program flow
⭐ Debugging tricky conditions
⚠️ Disclaimer: This content is for educational purposes only.
Challenge Link: https://crackmes.one/crackme/5d63011533c5d46f00e2c305
#x64dbg #reverseengineering #debugging #x86 #x64 #assembly #zeroflag #zf #conditionaljump #jz #jnz #binaryanalysis #crackme #ctf #malwareanalysis #lowlevel #hacking #debugger #assemblytutorial #programflow
SnatchDreams - Its Insane Here !!
Github: https://github.com/paulpjoby