reverseProhard
locked-in
DiceCTF 2026 Quals
A custom stack-based VM interpreter (`locked_in`, ELF 64-bit, stripped, statically linked) executes bytecode (`flag_verifier.bin`, 43360 bytes) that verifies a 30-character flag in `dice{...}` format. The binary runs in Docker (ubuntu:22.04) and prints "Flag accepted" or "Flag rejected". The VM supp
$ ls tags/ techniques/
vm_opcode_reverse_engineeringstack_emulationmaze_bfs_pathfindingtransformation_pipeline_inversionreverse_processing_order_discoveryfutex_channel_communication_tracingconstant_extraction_via_emulation
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [pwn][Pro]login— volgactf
- [reverse][Pro]SuiGeneris— caplag
- [pwn][Pro]Bottoms Up— miptctf
- [reverse][Pro]flag_checker— kalmarctf
- [reverse][Pro]Challenge7— tamuctf