reverseProhard
Aros-25
kalmarctf
Task: stripped 32-bit ARM ELF behind a raw TCP service, exposing a small custom VM and a hidden file oracle. Solution: recover the VM opcodes and syscalls, read flag.txt into mapped memory, then use the buggy exit printer as a byte-by-byte leak primitive.
$ ls tags/ techniques/
vm_reconstructionsyscall_recoveryoracle_exfiltrationbytewise_leak
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [pwn][free]Arms Roped— hackthebox
- [hardware][free]Bare Metal— hackthebox
- [pwn][Pro]Bottoms Up— miptctf
- [reverse][free]oracle— umdctf
- [pwn][Pro]stackgift— spbctf