reversePromedium

По дороге к Замку Капибар (On the Road to Capybara Castle)

hackerlab

Task: UPX-packed ELF binary with corrupted magic bytes and sequential arithmetic/XOR obfuscation. Solution: Repair UPX header by replacing CDB! with UPX!, unpack, extract target bytes from .data section, and reverse 25 sequential operations.

$ ls tags/ techniques/
Static binary analysis with objdumpUPX header repair (anti-unpacking bypass)Reverse engineering of obfuscation algorithmCryptographic operation reversal

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups