![](https://img-blog.csdnimg.cn/20201014180756928.png?x-oss-process=image/resize,m_fixed,h_64,w_64)
reverse
Rv1nm4
得空水一道reverse,自娱自乐
展开
-
2021-09-24
攻防世界EasyRE & Guess-the-NumberEasyRE可执行文件运行让用户“input”Shift+Fn+F12 打开IDA中字符串视图,定位“input”在函数sub_401080中主函数源码如下:int sub_401080(){ unsigned int v0; // kr00_4 signed int v1; // edx char *v2; // esi char v3; // al unsigned int v4; // edx in原创 2021-09-24 19:54:33 · 157 阅读 · 0 评论 -
2021-09-16
2019_UNCTF 666很简单的代码审计加解密,快速水一篇睡觉了23333main函数int __cdecl main(int argc, const char **argv, const char **envp){ char s; // [rsp+0h] [rbp-1E0h] char v5; // [rsp+F0h] [rbp-F0h] memset(&s, 0, 0x1EuLL); //给s初始化内存 printf("Please Input Key: ",原创 2021-09-16 23:04:30 · 96 阅读 · 0 评论 -
2021-09-14
elrond32丢进exeInfoPe,32位无壳,IDA分析主函数很简约int __cdecl main(int a1, char **a2){ if ( a1 > 1 && sub_8048414(a2[1], 0) ) { puts("Access granted"); //进入if语句可以get flag sub_8048538((int)a2[1]); } else { puts("Access denied"); }原创 2021-09-14 22:29:32 · 75 阅读 · 0 评论 -
2021-09-13
CSAW2013reversing2尝试打开可执行文件,返回Flag弹窗,可惜是乱码丢进exeinfoPe,32位无壳,IDA分析int __cdecl __noreturn main(int argc, const char **argv, const char **envp){ int v3; // ecx CHAR *lpMem; // [esp+8h] [ebp-Ch] HANDLE hHeap; // [esp+10h] [ebp-4h] hHeap = HeapCrea原创 2021-09-13 21:30:10 · 113 阅读 · 0 评论