Published onJanuary 27, 2025PCC CTF - AshfaqVM Complete Reverse Engineering WriteupPCC25-QUALreverse-engineeringvmcustom-architecturecryptographyctfComplete reverse engineering of AshfaqVM - a custom virtual machine with encrypted flag validation. Includes VM architecture analysis, tool development, and algorithm reversal.
Published onJanuary 27, 2025PCC CTF - Flag Generator Reverse Engineering WriteupPCC25-QUALreverse-engineeringjavaspring-bootclassfinalaesctfJava Spring Boot application reverse engineering challenge. Bypassed ClassFinal obfuscation to analyze license validation and generate valid license keys.
Published onJanuary 27, 2025PCC CTF - ROP Reverse Engineering Challenge WriteupPCC25-QUALreverse-engineeringropxorctfbinary-analysisReverse engineering challenge disguised as ROP exploitation. Analyzed ROP chain to extract XOR keys and decrypt the flag.
Published onJanuary 27, 2025PCC CTF - Reverse Flag Validator WriteupPCC25-QUALreverse-engineeringxorbinary-analysisctfstatic-analysisReverse engineering challenge involving XOR decryption. Analyzed binary to extract encrypted data and decrypt using XOR key to reveal the flag.