reverseeasy
Jaakko
sbpctf
Task: a PE32 crackme asks for a valid serial and contains an interesting embedded string in .rdata. Solution: reverse the validation routine, observe how it swaps two halves around an inserted underscore, and recover the serial answer_simple.
$ ls tags/ techniques/
static_analysisstring_reconstructionbyte_by_byte_comparison
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub to get started.
$ssh [email protected]