reverseeasy
Warmup (Task 49)
duckerz
Task: 64-bit ELF binary with encrypted flag. Solution: Identified ROL 5 bit rotation in transform_string function, extracted encrypted data from .rodata section, applied inverse ROR 5 operation to decrypt the flag.
$ ls tags/ techniques/
static_binary_analysisbitwise_rotationrodata_extractionreverse_engineering
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]