每日刷题21-14-14

Preface

Nothing to say.

Lst’s go.

MISC

Title : reverseMe

Source : XCTF

File : Click me

The file is a jpg:

Drop it to PS, reverse it:

Use the ocr software to get the string:

flag{4f7548f93c7bef1dc6a0542cf04e796e}

It’s so easy.

RE

Title : no-strings-attached

Source : XCTF

Hint : 菜鸡听说有的程序运行就能拿Flag?

File : Click me

Drop it into 010 , we can know it is an ELF file;

Using the IDA open the elf-file.:

Find the encryption function in the main function, and then need dynamic debugging.
The debug command is as follows:

gdb filename         //执行文件
b authenticate       //在authenticate函数处下断点
r                    //run 让程序开始运行
n                    //n是单步步过,s是单步步进

The first time GDB is used, such an error will appear:

Even if you open the root permission, you will report an error
The right way is the commend:

chmod 777 (filenema)

Next, execute the debug command normally:

info reg  //show the reg informations
info reg eax  //show the eax info
x/6sw $eax    //show the eax to string

flag get!

评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值