BUU逆向-新年快乐-Reverse3

新年快乐

Source : BUU

File : Click here

Using the exeinfo to check the shell:

As we see , it’s an UPX shell , Using the UPXshell to dump it.

Open the dump file with IDA32. Then Shift+F12 to check the string.

F5 to find the critical(关键) code .

Very simple, flag is the “Happy New Year” stored in V5.

flag{HappyNewYear!}

Reverse3

Type : REV

Source : same as above

File : Click here

Check the shell:

That’s great. There’s no shell!

Drop it into IDA32:

As we see , it may be a Base64 encryption;

Write a python script to solve this problem:

import base64
flag = ''
s=''
i = 0
str = 'e3nifIH9b_C@n@dH'

for i in range(len(str)):
    s += chr(ord(str[i]) - i)
print(s)

flag = base64.b64decode(s)
print(flag)

flag get!

flag{i_l0ve_you}

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 1
    评论
评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值