reverseeasy

FlagCasino

hackthebox

Task: Reverse a 64-bit ELF binary that validates 29-character input through PRNG. Solution: Brute-force each character (0-255) as srand() seed, matching rand() output against constants from .data section using ctypes.

$ ls tags/ techniques/
prng_bruteforceglibc_rand_simulation

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]