reverseeasy

Behind the Scenes

hackthebox

Task: ELF binary with anti-decompilation protection using ud2 instructions. Solution: Bypass ud2+SIGILL technique by static analysis of disassembly, extract password chunks from .rodata section.

$ ls tags/ techniques/
static_analysisrodata_extractionud2_anti_decompilationsignal_handler_bypass

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]