接触安卓的第二天,还是一道简单的安卓逆向
首先,搜索main函数,
找到main函数:发现加密方式,以四个字符串为一组进行MD5加密,发现加密后的为256位,4位转MD5为32位,即为8组
写python代码分8组:
strr='8393931a16db5a00f464a24abe24b17a9040b57d9cb2cbfa6bdc61d12e9b51f2789e8a8ae9406c969118e75e9bc65c4327fbc7c3accdf2c54675b0ddf3e0a6099b1b81046d525495e3a14ff6eae76eddfa1740cd6bd483da0f7684b2e4ec84b371f07bf95f0113eefab12552181dd832af8d1eb220186400c494db7091e402b0'
print(len(strr))
for i in range(8):
print(strr[32*i:32*i+32])
输出:
8393931a16db5a00f464a24abe24b17a
9040b57d9cb2cbfa6bdc61d12e9b51f2
789e8a8ae9406c969118e75e9bc65c43
27fbc7c3accdf2c54675b0ddf3e0a609
9b1b81046d525495e3a14ff6eae76edd
fa1740cd6bd483da0f7684b2e4ec84b3
71f07bf95f0113eefab12552181dd832
af8d1eb220186400c494db7091e402b0
逐个MD5解密:
得出答案:NSSCTF{4aea146e9dc7365e4ec931f547284822}