reversehard

6 Horcruxes

hackerlab

Task: 5 binaries (Rust, Python/PyInstaller, ARM64, Movfuscator/ASM, Go) and a text file with 6-layer AES-CBC ciphertext — each binary hides one key/IV pair, and a 6th ELF is embedded inside the Rust binary. Solution: reverse each binary to extract all 6 key/IV pairs, then decrypt the 6-layer AES-CBC ciphertext in reverse order.

$ ls tags/ techniques/
upx_unpackingpyinstaller_extractionarm_reverse_engineeringmovfuscator_graph_analysisembedded_binary_extractionprng_replay_attackbyte_level_brute_forceaes_cbc_decryption_chainmulti_language_reversing

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub to get started.

$ssh [email protected]