reversemedium

MC 3 (Dynamic Analysis)

spbctf

Task: Reverse engineer a statically linked stripped ELF with custom VM interpreter. Solution: Extract flag characters by finding byte pattern 0x0d 0xa7 0x1f in .data section.

$ ls tags/ techniques/
data_section_analysispattern_extractioncustom_vm_analysis

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]