################################
#               	       #
#   LEVEL (3) ANS              #
#                              #
################################
 To complete this level, follow these steps:

1. Examine the program carefully.

CRUCIAL ASPECTS OF THE LEVEL:

- The `if` statement containing `strncat` and XOR operations.
- The final `warcrime` if statement.
- The variables utilized in the `warcrime` if statement. The rest is unnecessary.

DISSECTING THE LOGIC OF THE LEVEL:

1. The program initializes many unnecessary variables, storing them (likely in an insecure manner) within a print statement. These variables are not used subsequently, and surprisingly, GCC permits this.

2. Before adding more unnecessary variables, the program requests a password from the user. Following this, crucial variables are defined—a set of arrays divided into smaller chunks. These chunks are then broken down further into individual character variables.

3. Inside an `if` statement, the program extracts characters 1-3 (0x3) from a junk string (L0x31yy) and puts it in a variable that argv[1] will be compared to.

4. You might have spotted two instances where a single-character variable undergoes XOR operation (using RzGhidra syntax: `_4_1 ^ 3` and `_3_1 ^ 5`).

5. Another `if` statement is executed, verifying if `argv` contains a value. If it does, the program checks (in a rather tedious manner) whether every character in the `password` variable matches the multiple single-character variables.

The password for this level is `01267567`, and the `argv[1]` value is `0x3`.
