运行一下
需要我们输入正确的code
查壳
发现有upx壳,脱壳后不知为何,打开直接闪退,OD也分析不了,但IDA能用
查看反编译代码
int __cdecl main(int argc, const char **argv, const char **envp)
{
char v4; // [esp+4h] [ebp-804h] BYREF
char v5[1023]; // [esp+5h] [ebp-803h] BYREF
char v6; // [esp+404h] [ebp-404h] BYREF
char v7[1023]; // [esp+405h] [ebp-403h] BYREF
v6 = 0;
memset(v7, 0, sizeof(v7));
v4 = 0;
memset(v5, 0, sizeof(v5));
printf("please input code:");
scanf("%s", &v6); //输入code
sub_401000(&v6); //对输入的code加密
if ( !strcmp(&v4, "DDCTF{reverseME}") )
printf("You've got it!!%s\n", &v4);
else
printf("Try again later.\n");
return 0;
}
查看加密函数
unsigned int __cdecl sub_401000(const char *a1)
{
_BYTE *v1; // ecx
unsigned int v2; // edi
unsigned int result; // eax
int v4; // ebx
v2 = 0;
result = strlen(a1);
if ( result )
{
v4 = a1 - v1; //a1是输入字符串的地址,v1 = 0, v4 = a1
do
{
*v1 = byte_402FF8[(char)v1[v4]]; //(char)v1[v4]依次指向a1各个字符
++v2; //计数
++v1;
result = strlen(a1);
}
while ( v2 < result );
}
return result;
}
查看byte_402FF8
加密函数作用:将code[i] 换成 byte_402FF8[code[i]的ASCII码]
byte_402FF8中有单、双引号,16进制形式感觉容易表示
Exp
byte_402FF8 = [0x7E, 0x7D, 0x7C, 0x7B, 0x7A, 0x79, 0x78, 0x77, 0x76, 0x75, 0x74, 0x73, 0x72, 0x71, 0x70, 0x6F, 0x6E, 0x6D,
0x6C, 0x6B, 0x6A, 0x69, 0x68, 0x67, 0x66, 0x65, 0x64, 0x63, 0x62, 0x61, 0x60, 0x5F, 0x5E, 0x5D, 0x5C, 0x5B,
0x5A, 0x59, 0x58, 0x57, 0x56, 0x55, 0x54, 0x53, 0x52, 0x51, 0x50, 0x4F, 0x4E, 0x4D, 0x4C, 0x4B, 0x4A, 0x49,
0x48, 0x47, 0x46, 0x45, 0x44, 0x43, 0x42, 0x41, 0x40, 0x3F, 0x3E, 0x3D, 0x3C, 0x3B, 0x3A, 0x39, 0x38, 0x37,
0x36, 0x35, 0x34, 0x33, 0x32, 0x31, 0x30, 0x2F, 0x2E, 0x2D, 0x2C, 0x2B, 0x2A, 0x29, 0x28, 0x27, 0x26, 0x25,
0x24, 0x23, 0x22, 0x21, 0x20] #留下可显示字符
s = 'DDCTF{reverseME}'
code = ''
for i in s:
code += chr(byte_402FF8[ord(i) - 32]) #因为去掉了前32个不可显示字符,所以多减32
print(code)
输出ZZ[JX#,9(9,+9QY!
验证一下
后来查询得知是程序开启了ASLR,并且出题人又在程序中采用了绝对地址的方式
要关闭ASLR,可以使用PETools,也可以将程序放到windows xp下分析
我选择用工具关闭
关闭后程序就能正常运行或者用OD分析