reverseeasy

Warmup (Task 49)

duckerz

Task: 64-bit ELF binary with encrypted flag. Solution: Identified ROL 5 bit rotation in transform_string function, extracted encrypted data from .rodata section, applied inverse ROR 5 operation to decrypt the flag.

$ ls tags/ techniques/
static_binary_analysisbitwise_rotationrodata_extractionreverse_engineering

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]