reverseProeasy
Разминка (Warmup)
hackerlab
Task: .NET PE32 executable with AES encryption, find the correct password. Solution: Extract hardcoded AES key/IV from #US heap and encrypted flag from data section, decrypt with AES-CBC.
$ ls tags/ techniques/
.NET metadata analysis (#US heap string extraction)Static data extraction from PE sectionsAES-CBC decryption with hardcoded key/IVBinary analysis with xxd/strings
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [reverse][Pro]Warmup (Task 49)— duckerz
- [reverse][Pro]Artistic Warmup— srdnlen
- [stego][Pro]Warmup— hackerlab
- [crypto][Pro]Одноразовый блокнот (One-Time Pad)— hackerlab
- [forensics][Pro]Какой-то DMP...— hackerlab