reversePromedium
Artistic Warmup
srdnlen
Task: PE32+ Windows flag checker using GDI bitmap comparison instead of string comparison. Solution: Extract embedded XOR-encrypted bitmap data, decrypt with 0xAA key, render as image to reveal flag text.
$ ls tags/ techniques/
xor_decryptiongdi_bitmap_renderingapi_hash_resolutionbitmap_extraction
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [reverse][Pro]Разминка (Warmup)— hackerlab
- [reverse][Pro]Warmup (Task 49)— duckerz
- [reverse][free]Debugme— HackTheBox
- [reverse][Pro]It's over— hackerlab
- [reverse][Pro]Зиг-заг (Zig-zag)— duckerz