reversehard

Random

hackerlab

Task: a broken PE32+ encrypter and a large encrypted file hide the real flag behind packing, decoy strings, and a timestamp-seeded transform. Solution: patch the PE header, unpack/analyze the routine, extract the hidden decimal ciphertext, emulate the code with Unicorn, and invert it byte by byte.

$ ls tags/ techniques/
unicorn_emulationprng_seed_recoveryheader_patchingupx_stub_analysisbytewise_transform_inversion

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub to get started.

$ssh [email protected]