reverseProhard

Challenge7

tamuctf

Task: Stripped 64-bit ELF with VM-based obfuscation, anti-debugging (TracerPid, LD_PRELOAD, .text integrity), hash-chain dispatch, and self-modifying code. Solution: Deep static analysis of flag validation function revealed rolling hash with TEA-like constants; brute-forced each character position against hardcoded lookup tables.

$ ls tags/ techniques/
vm_dispatch_analysisanti_debug_bypassrolling_hash_bruteforcehash_chain_dispatchelf_section_integrity_check

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups

  • [reverse][free]cf madness— pingctf2026
  • [reverse][Pro]Basic— spbctf
  • [pwn][Pro]Taste— grodno_new_year_2026
  • [reverse][Pro]Reverse Me— taipanbyte
  • [pwn][free]0xDiablos— hackthebox