reversePromedium

Call my name softly - TaipanByte CTF

taipanbyte

Task: Reverse engineer an ELF binary with two chains of 15 sequentially-named functions each. Solution: Use radare2 to trace function chains to their terminal functions, extract hex-encoded strings from the endpoints, concatenate and decode hex to ASCII, wrap in CTF{} flag format.

$ ls tags/ techniques/
static_analysisfunction_chain_analysishex_to_ascii

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups