miscmedium

Who4reu

taipanbyte

Task: File 2.tb identified as WIM image containing obfuscated JavaScript. Solution: Extract JS from WIM container, execute with alert override to get Base32 string, decode to reveal flag.

$ ls tags/ techniques/
base32_decodingjs_deobfuscationarray_shuffle_patternwim_extractionalert_override

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]