reverseProhard
bedtime
dicectf_2026
Task: Stripped static-PIE Rust binary with x32 ABI anti-debug that always outputs error. Solution: Extract 384 GF(1024) buffer entries from disassembly, compute XOR modulo to determine each flag bit.
$ ls tags/ techniques/
static_rust_binary_analysisgf_modular_xor_computationregister_tracking_in_disassemblymsb_bit_packinganti_debug_bypass_via_static_analysisbuffer_constant_extraction_from_disassemblyentry_to_buffer_mapping_via_stack_offsets
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [reverse][free]cf madness— pingctf2026
- [reverse][Pro]Challenge7— tamuctf
- [reverse][Pro]Explore. Build. Survive.— taipanbyte
- [reverse][free]Debugme— HackTheBox
- [pwn][Pro]Taste— grodno_new_year_2026