Deep Analysis
Deep analysis on the pseudo-code we found
Learning Steps
What is it?
Deep analysis is exactly what it sounds- taking a component and deeply analyzing it. In the case of pseudo-code, we can take a very specific section of the generation and analyze it as deeply as we can (which includes dissecting other functions if need be) and see what we can figure out about the function we are most interested in.
My analysis methods
Everyone's method of dissecting, labeling, and analyzing functions is going to be different. Some like to go really unique and make their own style while others may just stick to basic annotation, note keeping and more.
For me, I am a bit of a nerd and like using my own method and dissective representations to breakdown specific pieces of logic and data flow throughout the code.
Is It Necessary?
Deep analysis takes loads of time if you are new to that specific environment. So deep analysis really only becomes most practical when you have a function that actually holds a heavy amount of worth. This includes threading systems, any weird or suspicious non-standard functions, and something relative to what you are looking for. That is the case with this function.
Deep Analysis On The Function
Kicking this right off the bat for where it needs to be- we can have a tasty look at my analysis I got wounded up!

Okay, honest impressions- Its a brainfuck, I know- so lets explore it.
Color key
Red -> Important
Yellow -> Semi important / informal
Blue -> Informational but external
Green -> information but relevant to data flow
While there were other important highlight here, I wanted to make sure it was as easy to read without all the lines everywhere so I just left the other dissections alone.
Breaking down the main code section.
The main code section is the code section I did not highlight in the image. The reason I did that is so that we can explore the pseudocode a bit deeper. The code below is annotated with a higher logical representation
This brick of code is basically checking for characters https while itterating over the value and setting a multitude of conditions to trigger different return statuses. We know that this in fact checking for characters HTTPS because in the while loop shown below, the decimal values can be converted to ASCII representation.
For this, we put it all together and get - "https" which is good because this means we are in fact checking if the string includes this (as we proofed with the tests).
Now what? - Answer page
Well now we can actually analyze the results and the conditions to see exactly how the DOUF was found.
DOUF ExplanationLast updated
