Tags: sha2017ctf 

Rating:

```
# objdump -D ./Jumparound > Jumparound.txt
```
```
open Jumparound.txt in Notepad++
in main @400639: jne 400647 <main+0x21> found
and @400647: mov $0x0,%eax found
and @40064c: callq 400546 <print_flag> found
open Jumparound in Frhed then edit data @ 0x639 from 0x75(jne) to 0xeb (jmp)
```
```
# ./Jumparound-400639-75toEB
Well done jumping, the flag is flag{f525a6abd58ce9488f3c90904149145d}
```

Original writeup (http://imgur.com/a/ltIVs).