reversemedium
Call my name softly - TaipanByte CTF
taipanbyte
Task: Reverse engineer an ELF binary with two chains of 15 sequentially-named functions each. Solution: Use radare2 to trace function chains to their terminal functions, extract hex-encoded strings from the endpoints, concatenate and decode hex to ASCII, wrap in CTF{} flag format.
$ ls tags/ techniques/
static_analysisfunction_chain_analysishex_to_ascii
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]