reverse engineering a memory dump to obtain the password


reverse engineering the executable to obtain a valid serial


reverse engineering the executable to decrypt the flag stored in memory