reversemedium
Task of the Ancient Rus
hackerlab
Task: a multi-stage archive challenge mixes an AES-encrypted ZIP, fake ancient-style C source, a decoy assembly file, an MP3 with an appended clue, and a modified NASM executable. Solution: invert the checker to recover the ZIP password, ignore the asm red herring, carve the MP3 trailer hint, diff nasm.exe against the official build, and decode the hidden blob from .data slack.
$ ls tags/ techniques/
slack_spaceaes_zippe32_plusarchive_encryptionsource_obfuscationcyrillic_macrosmp3_trailerbinary_diffnasmdecoy_assembly
transform_inversionred_herring_eliminationarchive_password_recoverytrailer_carvingbinary_diffingslack_space_decoding
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub to get started.
$ssh [email protected]