Newstar-CTF 逆向入门
week1
Hello_Reverse
明文存储:
1 | flag{h3llo_r3vers1ng_w0rld} |
Baby_Re
简单异或,有一点小坑,在libc_csu_init的时候调用了Function_name函数
exp
1 | str = [0x66, 0x6D, 0x63, 0x64, 0x7F, 0x56, 54, 0x6A, 0x6D, 0x7D, 0x62, 58, 0x62, 0x6A, 0x51, 0x7D, 0x65, 0x7F, 0x4D, 0x71, 0x71, 0x73, 38, 0x65, 0x7D, 0x46, 0x77, 0x7A, 0x75, 0x73, 63] |
Pyre
一道py打包成exe的逆向,先利用工具https://link.csdn.net/?target=https%3A%2F%2Fgithub.com%2Fextremecoders-re%2Fpyinstxtractor,解出字节码,然后利用字节码反编译,搞出py文件,随后就比较简单了
1 | ##flag{PYRE_1S_S0_FUN!!!} |
EasyRe
dll里有个加密函数 base64+异或
1 | str2 = [0x08, 0x08, 0x0E, 0x0D, 0x28, 0x40, 0x11, 0x11, 0x3C, 0x2E, 0x2B, 0x1E, 0x3D, 0x0F, 0x00, 0x03, 0x3B, 0x3D, 0x3C, 0x15, 0x28, 0x05, 0x50, 0x46, 0x3F, 0x2A, 0x39, 0x09, 0x31, 0x56, 0x24, 0x1C, 0x3F, 0x24, 0x50, 0x3C, 0x2C, 0x25, 0x23, 0x4B] |
艾克体悟题
安卓逆向?我直接开摆
本博客所有文章除特别声明外,均采用 CC BY-NC-SA 4.0 许可协议。转载请注明来自 gxh's blog!