reverseeasy
Uttar
spbctf
Task: a PE32 Windows console binary asks for a valid serial key and contains a hardcoded reference string. Solution: inspect the check routine, notice the XOR-swap of the 3rd and 4th input characters before comparison, and invert that transform to recover the accepted serial.
$ ls tags/ techniques/
static_analysisstring_extractioninput_transformation_reversal
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub to get started.
$ssh [email protected]