reversemedium

Hexecution

hackthebox

Task: Reverse engineer a custom VM interpreter and its cooking-themed esoteric assembly to find the flag. Solution: Map all opcodes via Ghidra, identify double permutation cipher (intra-block + inter-block), invert both permutations to recover the original input.

$ ls tags/ techniques/
custom_vm_emulationopcode_reverse_engineeringpermutation_inversiondouble_permutation_reversalblock_shuffle_reversal

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]