reverseProhard
Анализатор вселенной (Universe Analyzer)
hackerlab
Task: UPX-packed binary with corrupted magic, SIGILL-based XTEA encryption, and obfuscated arithmetic. Solution: Repair UPX magic, compare with core dump to find corrupted bytes, recover custom XTEA delta, and decrypt flag.
$ ls tags/ techniques/
state_machineupxsigillsignal_handlerstripped_binaryanti_analysisxteaucontextobfuscated_additionstatic_linkedcore_dumpcorrupted_magic
upx_magic_repairsigill_signal_handler_reversingobfuscated_arithmetic_identificationcore_dump_diffingxtea_decryption_custom_deltastate_machine_analysis
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [reverse][Pro]По дороге к Замку Капибар (On the Road to Capybara Castle)— hackerlab
- [pwn][Pro]BOF: Обратная сторона Луны (Moon)— hackerlab
- [pwn][Pro]HackerLab: Экзамен?? — Buffer Overflow via scanf(\"%lX\")— hackerlab
- [reverse][Pro]Антигравитация (Antigravity)— duckerz
- [forensics][Pro]BadUSB— duckerz