reverseProeasy

Разминка (Warmup)

hackerlab

Task: .NET PE32 executable with AES encryption, find the correct password. Solution: Extract hardcoded AES key/IV from #US heap and encrypted flag from data section, decrypt with AES-CBC.

$ ls tags/ techniques/
.NET metadata analysis (#US heap string extraction)Static data extraction from PE sectionsAES-CBC decryption with hardcoded key/IVBinary analysis with xxd/strings

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups