forensicsPromedium

BadUSB

duckerz

Task: Analyze BadUSB firmware (Arduino Micro ELF) to identify the attacker. Solution: Reverse AVR firmware, extract XOR key (0x48) to decrypt password, use it to decrypt AES-256-CBC payload revealing GitHub URL, enumerate repository branches to find hidden fl46 branch with flag.

$ ls tags/ techniques/
avr_firmware_reversingxor_single_byte_decryptionopenssl_aes_decryptiongithub_branch_enumerationhid_attack_analysis

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups