reversehard
Cursed Steganography
duckerz
Task: recover a flag hidden in a 64x64 PNG image generated by a DCGAN neural network embedded in a Nuitka-compiled Windows executable. Solution: unpack the Nuitka onefile payload (zstd-compressed), intercept the PBKDF2 passphrase via DLL hooking under Wine, decrypt the AES-GCM encrypted ONNX model, reconstruct it in PyTorch, then perform gradient-based GAN model inversion to recover the latent vector and decode the flag from its sign bits.
$ ls tags/ techniques/
nuitka_onefile_unpackingdll_export_forwardinggan_model_inversiongradient_descent_optimizationlatent_sign_decodingonnx_to_pytorch_conversion
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]