reverseProeasy
Не стоит вскрывать эту тему (stop)
hackerlab
Task: ELF64 binary with XOR-encrypted flag. Solution: Extract hardcoded array from .data section and XOR with constant 0x41 to recover the flag.
$ ls tags/ techniques/
xor_decryptiondisassembly_analysisdata_section_extraction
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [reverse][Pro]Новелла (Novella)— duckerz
- [reverse][Pro]Strangeness (Странность)— duckerz
- [pwn][Pro]Вопрос (Question)— hackerlab
- [pwn][Pro]Вход не для всех (Entry is not for everyone)— hackerlab
- [reverse][Pro]Warmup (Task 49)— duckerz