writeup
2024 Cyber Apocalypse: BoxCutter
Use strace to identify file access attempts and retrieve the flag
#htb
#ctf
#reverse
+3 writeup
2024 Cyber Apocalypse: Crushing
Reverse engineer a compression algorithm and decode serialized data
#htb
#ctf
#reverse
+3 writeup
2024 Cyber Apocalypse: PackedAway
Unpack UPX-compressed executable to reveal hidden strings and flag
#htb
#ctf
#reverse
+3 writeup
2023 Cyber Apocalypse: CSHells
Reverse engineer custom shell binary and crack XOR-encrypted password
#htb
#ctf
#reverse
+3 writeup
2023 Cyber Apocalypse: Cave System
Solve complex multi-condition logic puzzle in binary
#htb
#ctf
#reverse
+2 writeup
2023 Cyber Apocalypse: Shattered Tablet
Reconstruct input string by analyzing multi-byte field access patterns
#htb
#ctf
#reverse
+2 writeup
2023 Cyber Apocalypse: Hunting License
Crack three-stage password validation in binary using string reversal and XOR
#htb
#ctf
#reverse
+3