Alas, tragedy struck when he joined too many suspicious Telegram groups without due caution and ended up getting infected by suspicious malware. It has long been rumored that many threat actors were after zeyu2001’s personal stockpile of the latest web 0-days. Common malware techniques like anti-debugging, string obfuscation, encryption, compression, packing, and process injection are used. This challenge is designed so that the full solving process provides you with a realistic approximation of completing an actual malware analysis task. no rev/pwn no life (r4kapig)’s crazyman was really close though! Details This SEETF 2022 Reversing challenge only had 1 solve by AuroraDawn’s gigx.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |