reversehard

It's over

hackerlab

Task: Reverse engineer a WinRAR SFX-wrapped PE executable with anti-debug and decoy flag. Solution: Discovered self-modifying code in PE overlay that decrypts hidden ChaCha20 verification shellcode using SUB+XOR transformation.

$ ls tags/ techniques/
WinRAR SFX unpackingDecoy flag identification via XOR decodingSelf-modifying code analysis in PE overlayRuntime shellcode decryption (SUB+XOR)ChaCha20 parameter extraction from x86-64 assemblyObfuscated constant recovery via XOR with 0xa5a5a5a5

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]