reversemedium
SEPC (Secure Enclave)
hackthebox
Task: Reverse a bootable Linux system with kernel module implementing password verification via char device. Solution: Extract two XOR tables from .rodata section of the unstripped kernel module and XOR them to recover the flag.
$ ls tags/ techniques/
rodata_extractionxor_key_recoverykernel_module_analysischar_device_protocol_reversinginitramfs_extraction
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]