reversePromedium
Go пореверсим
hackerlab
Task: Reverse engineer a Go binary for Windows x86-64 that prompts for a numeric code. Solution: Solve a polynomial equation to find the validation code (1127), then use it as XOR key to decrypt the flag stored as int64 array values.
$ ls tags/ techniques/
go_binary_reversingpolynomial_equation_solvingxor_with_known_plaintextbinary_pattern_search
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [reverse][Pro]Go task— rev-kids20.forkbomb.ru
- [reverse][Pro]eXecutables— TaipanByte CTF
- [reverse][Pro]Reverse Me— taipanbyte
- [reverse][Pro]It's over— hackerlab
- [reverse][Pro]Не стоит вскрывать эту тему (stop)— hackerlab