reverseProeasy
Const
spbctf
Task: ELF binary with decoy flag visible in strings. Solution: Identified constructor function in .init_array that modifies the flag via character swaps before main() executes.
$ ls tags/ techniques/
static_analysisobjdump_disassemblyconstructor_identificationswap_tracinginit_array_analysis
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [reverse][Pro]Deceptive Checker— miptctf
- [reverse][Pro]spbctf_4_x86_64— spbctf
- [reverse][Pro]Basic— spbctf
- [reverse][Pro]Reverse Me— taipanbyte
- [reverse][Pro]sparta— spbctf (rev-kids20)