Preface
Nothing to say.
Lst’s go.
MISC
Title : reverseMe
Source : XCTF
File : Click me
The file is a jpg:
Drop it to PS, reverse it:
Use the ocr software to get the string:
flag{4f7548f93c7bef1dc6a0542cf04e796e}
It’s so easy.
RE
Title : no-strings-attached
Source : XCTF
Hint : 菜鸡听说有的程序运行就能拿Flag?
File : Click me
Drop it into 010 , we can know it is an ELF file;
Using the IDA open the elf-file.:
Find the encryption function in the main function, and then need dynamic debugging.
The debug command is as follows:
gdb filename //执行文件
b authenticate //在authenticate函数处下断点
r //run 让程序开始运行
n //n是单步步过,s是单步步进
The first time GDB is used, such an error will appear:
Even if you open the root permission, you will report an error
The right way is the commend:
chmod 777 (filenema)
Next, execute the debug command normally:
info reg //show the reg informations
info reg eax //show the eax info
x/6sw $eax //show the eax to string
flag get!