reversehard
It's over
hackerlab
Task: Reverse engineer a WinRAR SFX-wrapped PE executable with anti-debug and decoy flag. Solution: Discovered self-modifying code in PE overlay that decrypts hidden ChaCha20 verification shellcode using SUB+XOR transformation.
$ ls tags/ techniques/
xormingwshellcodechacha20anti_debugself_modifying_codesfx_unpackingdecoy_flagpe_overlayvirtualprotect
WinRAR SFX unpackingDecoy flag identification via XOR decodingSelf-modifying code analysis in PE overlayRuntime shellcode decryption (SUB+XOR)ChaCha20 parameter extraction from x86-64 assemblyObfuscated constant recovery via XOR with 0xa5a5a5a5
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]