reversemedium

SEPC (Secure Enclave)

hackthebox

Task: Reverse a bootable Linux system with kernel module implementing password verification via char device. Solution: Extract two XOR tables from .rodata section of the unstripped kernel module and XOR them to recover the flag.

$ ls tags/ techniques/
rodata_extractionxor_key_recoverykernel_module_analysischar_device_protocol_reversinginitramfs_extraction

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]