reversePromedium
По дороге к Замку Капибар (On the Road to Capybara Castle)
hackerlab
Task: UPX-packed ELF binary with corrupted magic bytes and sequential arithmetic/XOR obfuscation. Solution: Repair UPX header by replacing CDB! with UPX!, unpack, extract target bytes from .data section, and reverse 25 sequential operations.
$ ls tags/ techniques/
static_analysisxorobfuscationupxanti_unpackingheader_repairelf_binarysequential_operationsarithmetic_cipher
Static binary analysis with objdumpUPX header repair (anti-unpacking bypass)Reverse engineering of obfuscation algorithmCryptographic operation reversal
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [reverse][Pro]Анализатор вселенной (Universe Analyzer)— hackerlab
- [stego][Pro]Капибара— duckerz
- [stego][Pro]Внимательнее надо быть!— taipanbyte
- [reverse][Pro]eXecutables— TaipanByte CTF
- [reverse][Pro]Не стоит вскрывать эту тему (stop)— hackerlab