reverseProhard

Cursed Steganography

duckerz

Task: recover a flag hidden in a 64x64 PNG image generated by a DCGAN neural network embedded in a Nuitka-compiled Windows executable. Solution: unpack the Nuitka onefile payload (zstd-compressed), intercept the PBKDF2 passphrase via DLL hooking under Wine, decrypt the AES-GCM encrypted ONNX model, reconstruct it in PyTorch, then perform gradient-based GAN model inversion to recover the latent vector and decode the flag from its sign bits.

$ ls tags/ techniques/
nuitka_onefile_unpackingdll_export_forwardinggan_model_inversiongradient_descent_optimizationlatent_sign_decodingonnx_to_pytorch_conversion

πŸ”’

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups