reversemedium

Call my name softly - TaipanByte CTF

taipanbyte

Task: Reverse engineer an ELF binary with two chains of 15 sequentially-named functions each. Solution: Use radare2 to trace function chains to their terminal functions, extract hex-encoded strings from the endpoints, concatenate and decode hex to ASCII, wrap in CTF{} flag format.

$ ls tags/ techniques/
static_analysisfunction_chain_analysishex_to_ascii

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]