刷题记录21-4-24

csaw2013reversing2

Type :REV

Source : XCTF

File : Click me

First of all, let’s run this program to get a general idea of the principle(原理)
在这里插入图片描述

Open the software can only display a garbled pop-up window

I think he should have carried out a judgment. You can skip the garbled code and display the real flag by changing the assembly code.

Open it with DTdbg:

Finded the info about flag.

Find the calling address from the stack

Found that he is not a simple jump judgment, should be an encryption program.

Combined with the pseudo code in IDA, we can find that a function is skipped:

This function just operates on the flag, so first locate the isdebugerpresent function and find the encryption function nearby:

The commend which is marked by blue line , has jumped the encrypt function.

So we can point the JMP instruction to the skipped function, and then point the JMP after the function directly to the output message box.

Like this:

Then we can find the flag in reg EAX or run the new file:

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值