reversemedium

Virtually Mad

hackthebox

Task: Reverse engineer a custom VM in a stripped ELF binary that takes hex-encoded opcodes and checks final register state. Solution: Analyzed bitfield-encoded instruction format, identified 5-instruction set (MOV/ADD/SUB/CMP/EXIT), and constructed opcode sequence to achieve required register values within operand constraints.

$ ls tags/ techniques/
custom_vm_reverse_engineeringopcode_format_analysisbitfield_extractionregister_state_constraint_solvingdispatch_loop_analysis

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]