reverseProhard

It's over

hackerlab

Task: Reverse engineer a WinRAR SFX-wrapped PE executable with anti-debug and decoy flag. Solution: Discovered self-modifying code in PE overlay that decrypts hidden ChaCha20 verification shellcode using SUB+XOR transformation.

$ ls tags/ techniques/
WinRAR SFX unpackingDecoy flag identification via XOR decodingSelf-modifying code analysis in PE overlayRuntime shellcode decryption (SUB+XOR)ChaCha20 parameter extraction from x86-64 assemblyObfuscated constant recovery via XOR with 0xa5a5a5a5

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups