Reverse-Engineering AMD Microcode | WHY2025 Zenmaster
Analysis of a Base64-encoded ELF execution service, bypassing restrictions, and reverse-engineering AMD microcode to recover the flag (unintended solution).
4 items with this tag.
Analysis of a Base64-encoded ELF execution service, bypassing restrictions, and reverse-engineering AMD microcode to recover the flag (unintended solution).
Extracting data from a CAT24C64B EEPROM via custom ATmega328P I2C firmware, dumping its contents, discovering it’s a SWF file, and analyzing it to reveal the hidden flag.
Reverse-engineered a precision R-2R DAC; extracted the flag via analog-to-digital conversion and bitwise analysis.
Decoded a 16-byte flag from RAM using a custom Python script that emulates a Logisim XOR circuit, bypassing brute-force limitations.