reversemedium

Partial Encryption

hackthebox

Task: PE32+ Windows binary with no visible strings or logic in static analysis. Solution: Identified self-modifying code pattern (VirtualAlloc/VirtualProtect/VirtualFree), reverse-engineered AES-NI based runtime decryption algorithm, decrypted code blobs offline to reveal flag checker logic.

$ ls tags/ techniques/
runtime_code_decryptionaes_ni_manual_analysisencrypted_code_blobsoffline_decryptiondynamic_analysis

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]