reverseeasy

Jaakko

sbpctf

Task: a PE32 crackme asks for a valid serial and contains an interesting embedded string in .rdata. Solution: reverse the validation routine, observe how it swaps two halves around an inserted underscore, and recover the serial answer_simple.

$ ls tags/ techniques/
static_analysisstring_reconstructionbyte_by_byte_comparison

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub to get started.

$ssh [email protected]