WHY2025 [REV] Zenmaster
Analysis of a Base64-encoded ELF execution service, bypassing restrictions, and reverse-engineering AMD microcode to recover the flag (unintended solution).
7 items with this tag.
Analysis of a Base64-encoded ELF execution service, bypassing restrictions, and reverse-engineering AMD microcode to recover the flag (unintended solution).
Exploiting Python object internals to hijack the __repr__ function pointer, redirecting execution to system("/bin/sh") for a shell, with adjustments for version-specific memory layouts.
Extracting and defeating a self-referential Python flag checker that uses version-specific marshal bytecode and anti-tampering keys by building a custom Python 3.10.12 interpreter with added debug prints to reveal the decrypted flag.
A stripped binary hides a flag behind complex modular arithmetic, requiring the discovery of six precise nine-digit integers to unlock it.
Analyzed a 64-bit stripped ELF, used Ghidra to dissect its dual-stage password checks (first_check, second_check), and unravelled the complex byte-wise logic checks to pass the “Congratulations!” gate.
Reverse-engineer a Makeself self-extracting archive using binwalk to uncover hidden tar data—brief and technical.
Reverse-engineering the Krusty Krab’s “free-delivery” APK: decompiled an Android app (patched by Plankton) with jadx, identified suspicious network traffic and shell command behavior.