forensicsPromedium
BadUSB
duckerz
Task: Analyze BadUSB firmware (Arduino Micro ELF) to identify the attacker. Solution: Reverse AVR firmware, extract XOR key (0x48) to decrypt password, use it to decrypt AES-256-CBC payload revealing GitHub URL, enumerate repository branches to find hidden fl46 branch with flag.
$ ls tags/ techniques/
avr_firmware_reversingxor_single_byte_decryptionopenssl_aes_decryptiongithub_branch_enumerationhid_attack_analysis
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [hardware][free]Defusal— hackthebox
- [hardware][free]Bare Metal— hackthebox
- [reverse][Pro]Boss— duckerz
- [reverse][Pro]Анализатор вселенной (Universe Analyzer)— hackerlab
- [crypto][Pro]Обратный шифр (Reverse Cipher)— duckerz