reversemedium
Hexecution
hackthebox
Task: Reverse engineer a custom VM interpreter and its cooking-themed esoteric assembly to find the flag. Solution: Map all opcodes via Ghidra, identify double permutation cipher (intra-block + inter-block), invert both permutations to recover the original input.
$ ls tags/ techniques/
custom_vm_emulationopcode_reverse_engineeringpermutation_inversiondouble_permutation_reversalblock_shuffle_reversal
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]