| @Elvis intended solution is to recover flag from just the trace.txt without looking at the shellcode (counting the for loop counter and getting the index in the random bytes array) !XD! |
4:25 PM 02/01/2022 |
==> |
| thanks @Elvis. Some writeups are already public because I used this challenge in Zh3r0 CTF v2 last year. I thought I should put it here as well. :) |
6:21 AM 01/31/2022 |
==> |
| yes |
6:12 AM 01/29/2022 |
==> |
| lazy - Can you post your solution i want to see why Libre calc was useful to you? |
1:46 PM 08/10/2021 |
==> |
| 4aca7f6c - Dude amazing writeup |
1:44 PM 08/10/2021 |
==> |
| It is easy to recognise the registers used by VM if you can recognise the code which emulating lets say the call instruction. it will add or sub from the sp and it will assign something to the pc. so you if you see this pattern you know which variable is sp and which one is pc. this is how you can sort of reconstruct the whole vm context. |
1:28 PM 06/13/2021 |
==> |
| flag{M3x1c4nMl4lw4r3_pl3rro} |
5:27 AM 10/05/2019 |
==> |