reversemedium
Обычная капибара (Usual Capybara)
hackerlab
Task: UPX-packed PE64 with oversized .data section containing a decoy JPEG dropper and a hidden XOR-encrypted PE binary. Solution: unpack UPX, discover hidden PE via single-byte XOR 0xFA, extract it, identify AES-128-CBC parameters from OpenSSL-linked code, decrypt embedded image to reveal flag.
$ ls tags/ techniques/
upx_unpackingsingle_byte_xor_decryptionembedded_pe_extractionaes_128_cbc_decryptionopenssl_static_analysishex_string_as_raw_key
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub to get started.
$ssh [email protected]