reversehard
6 Horcruxes
hackerlab
Task: 5 binaries (Rust, Python/PyInstaller, ARM64, Movfuscator/ASM, Go) and a text file with 6-layer AES-CBC ciphertext — each binary hides one key/IV pair, and a 6th ELF is embedded inside the Rust binary. Solution: reverse each binary to extract all 6 key/IV pairs, then decrypt the 6-layer AES-CBC ciphertext in reverse order.
$ ls tags/ techniques/
brute_forcepythongoxorandroidaes_cbcpyinstallercppupxprngrustarm64aarch64multi_layer_encryptionmovfuscatorembedded_binary
upx_unpackingpyinstaller_extractionarm_reverse_engineeringmovfuscator_graph_analysisembedded_binary_extractionprng_replay_attackbyte_level_brute_forceaes_cbc_decryption_chainmulti_language_reversing
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub to get started.
$ssh [email protected]