reverseeasy
My First Kernel
hackerlab
Task: a small 32-bit kernel binary prints a hint and runs a long arithmetic/XOR state update before checking three 32-bit words against constants. Solution: reverse one loop iteration, apply the inverse 0x1337 times to the target state, and decode the recovered little-endian dwords into the flag body.
$ ls tags/ techniques/
static_reverse_engineeringloop_inversionstate_recovery
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub to get started.
$ssh [email protected]