reverseProeasy

Warmup (Task 49)

duckerz

Task: 64-bit ELF binary with encrypted flag. Solution: Identified ROL 5 bit rotation in transform_string function, extracted encrypted data from .rodata section, applied inverse ROR 5 operation to decrypt the flag.

$ ls tags/ techniques/
static_binary_analysisbitwise_rotationrodata_extractionreverse_engineering

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups