reversemedium

Kitten and fl@g

hackerlab

Task: UPX-packed statically linked ELF binary (Tamagotchi game) with corrupted UPX header and a false flag in the game-win path. Solution: repaired UPX magic bytes, identified give_flag as a trap, discovered that printf was patched to call hidden __vfxsprintf function containing XOR-based flag construction verified via environment variables.

$ ls tags/ techniques/
upx_header_repairfalse_flag_identificationpatched_libc_function_analysisxor_chain_decodingoverlapping_memory_write_reconstructionenvironment_variable_flag_verification

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub to get started.

$ssh [email protected]