reversemedium

Task of the Ancient Rus

hackerlab

Task: a multi-stage archive challenge mixes an AES-encrypted ZIP, fake ancient-style C source, a decoy assembly file, an MP3 with an appended clue, and a modified NASM executable. Solution: invert the checker to recover the ZIP password, ignore the asm red herring, carve the MP3 trailer hint, diff nasm.exe against the official build, and decode the hidden blob from .data slack.

$ ls tags/ techniques/
transform_inversionred_herring_eliminationarchive_password_recoverytrailer_carvingbinary_diffingslack_space_decoding

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub to get started.

$ssh [email protected]