reverseeasy

My First Kernel

hackerlab

Task: a small 32-bit kernel binary prints a hint and runs a long arithmetic/XOR state update before checking three 32-bit words against constants. Solution: reverse one loop iteration, apply the inverse 0x1337 times to the target state, and decode the recovered little-endian dwords into the flag body.

$ ls tags/ techniques/
static_reverse_engineeringloop_inversionstate_recovery

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub to get started.

$ssh [email protected]