reversemedium
Virtually Mad
hackthebox
Task: Reverse engineer a custom VM in a stripped ELF binary that takes hex-encoded opcodes and checks final register state. Solution: Analyzed bitfield-encoded instruction format, identified 5-instruction set (MOV/ADD/SUB/CMP/EXIT), and constructed opcode sequence to achieve required register values within operand constraints.
$ ls tags/ techniques/
custom_vm_reverse_engineeringopcode_format_analysisbitfield_extractionregister_state_constraint_solvingdispatch_loop_analysis
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]