none
- dump flag.txt
- dump keks.exe
- reverse keks.exe and locate shellcode
- reverse shellcode
- Shellcode use CryptProtectMemory with flag SAME_PROCESS inside lsass.exe
- decyrpt flag.txt
Example solver: solution/solver.py
brics+{1m_just_4_m4n_1n_th3_w0rld_0f_p41n_4nd_suff3r1ng}