reversemedium
What Is This?
hackerlab
Task: a PE32+ Windows x64 executable dynamically resolves registry APIs and jumps into runtime-generated RWX code. Solution: dump or emulate the generated stub, recover its byte-minus-0x41 string decoder, and extract the flag written into HKCU\\SOFTWARE\\TASK_CODEBY.
$ ls tags/ techniques/
registrywindows_pex64self_modifying_codevirtualallocruntime_generated_codeadvapi32obfuscated_strings
dynamic_api_resolution_analysisruntime_stub_emulationstring_decoder_recoveryregistry_artifact_extraction
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub to get started.
$ssh [email protected]