reverseProeasy
Warmup (Task 49)
duckerz
Task: 64-bit ELF binary with encrypted flag. Solution: Identified ROL 5 bit rotation in transform_string function, extracted encrypted data from .rodata section, applied inverse ROR 5 operation to decrypt the flag.
$ ls tags/ techniques/
static_binary_analysisbitwise_rotationrodata_extractionreverse_engineering
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [reverse][Pro]Новелла (Novella)— duckerz
- [reverse][Pro]Reverse Me— taipanbyte
- [reverse][Pro]ПлюсМинус (Task 50)— duckerz
- [reverse][Pro]Разминка (Warmup)— hackerlab
- [reverse][Pro]Не стоит вскрывать эту тему (stop)— hackerlab