新年快乐
Source : BUU
File : Click here
Using the exeinfo to check the shell:
As we see , it’s an UPX shell , Using the UPXshell to dump it.
Open the dump file with IDA32. Then Shift+F12 to check the string.
F5 to find the critical(关键) code .
Very simple, flag is the “Happy New Year” stored in V5.
flag{HappyNewYear!}
Reverse3
Type : REV
Source : same as above
File : Click here
Check the shell:
That’s great. There’s no shell!
Drop it into IDA32:
As we see , it may be a Base64 encryption;
Write a python script to solve this problem:
import base64
flag = ''
s=''
i = 0
str = 'e3nifIH9b_C@n@dH'
for i in range(len(str)):
s += chr(ord(str[i]) - i)
print(s)
flag = base64.b64decode(s)
print(flag)
flag get!
flag{i_l0ve_you}