• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

LinuxSec Exploit

Nothing is Ever Locked

  • XSS Payloads
  • About Us

Mengenal Tentang Brainfuck Programming Language

April 11, 2015 by Jack Wilder Leave a Comment

Hmm… agak aneh ya . Tapi memnag demikian nama nya. Brainfuck Programming Language. Brainfuck adalah salah satu bahasa pemrograman yang diciptakan oleh Urban Muller pada tahun 1993, dengan tujuan diimplementasi pada compiler yang kecil.
Saya pertama mengenal bahasa Pemrograman ini kemarin pas ikut Cyber Defence. Dan disini saya akan share cara menerjemahkan Brainfuck sendiri.

Brainfuck Programming Language sendiri terdiri dari delapan perintah, dimana masing masing diwakili oleh karakter tunggal.

> Increment the pointer.
< Decrement the pointer.
+ Increment the byte at the pointer.
– Decrement the byte at the pointer.
. Output the byte at the pointer.
, Input a byte and store it in the byte at the pointer.
[ Jump forward past the matching ] if the byte at the pointer is zero.
] Jump backward to the matching [ unless the byte at the pointer is zero.

The semantics of the Brainfuck commands can also be succinctly expressed in terms of C, as follows (assuming that p has been previously defined as a char*):

> becomes ++p;
< becomes –p;
+ becomes ++*p;
– becomes –*p;
. becomes putchar(*p);
, becomes *p = getchar();
[ becomes while (*p) {
] becomes }

Sekian, semoga bermanfaat ya 😀
Refrensi

Filed Under: Uncategorized Tagged With: Linux, Programming, Taukah Kamu ?

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Popular Post

Shopify Custom Domain or Subdomain Takeover

MIME Type Sniffing pada Form Upload Gambar

FCKeditor Bypass Shell Upload With Burp Suite Intercept

Command Injection Bypass Cheatsheet

WordPress Plugin CopySafe PDF Protection Shell Upload

Deface WordPress dengan Exploit Themes Qualifire File Upload Vulnerability

Download 1n73ct10n / 1n73ction Privat Web Shell by X’1N73CT

CVE-2019-13360 – CentOS Control Web Panel Authentication Bypass

Deface dengan Metode Timthumb Remote Code Execution

Surge.sh Custom Domain or Subdomain Takeover

LinuxSec / 9 queries in 0.09 seconds