reversePromedium
Call my name softly - TaipanByte CTF
taipanbyte
Task: Reverse engineer an ELF binary with two chains of 15 sequentially-named functions each. Solution: Use radare2 to trace function chains to their terminal functions, extract hex-encoded strings from the endpoints, concatenate and decode hex to ASCII, wrap in CTF{} flag format.
$ ls tags/ techniques/
static_analysisfunction_chain_analysishex_to_ascii
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [reverse][Pro]Reverse Me— taipanbyte
- [reverse][free]cf madness— pingctf2026
- [reverse][Pro]Challenge7— tamuctf
- [reverse][Pro]CrackMe - TaipanByte CTF— taipanbyte
- [reverse][Pro]Boss— duckerz