本文主要是介绍秃头逆向刷题21-4-27,希望对大家解决编程问题提供一定的参考价值,需要的开发者们随着小编来一起学习吧!
Shuffle
Source : XCTF
FIle : Click
Hint : 找到字符串在随机化之前.
Check the shell with Exeinfo :
This is an ELF file , and no shell.
Drop it into IDA32 , Shift + F12 to check string :
It’s obviously ASCII code, and it starts with flag:
Select ASCII code, press R to switch to string:
flag get!
SECCON{Welcome to the SECCON 2014 CTF!}
answer_to_everything
Type : REV
File : Click
Hint : sha1 得到了一个神秘的二进制文件。寻找文件中的flag,解锁宇宙的秘密。注意:将得到的 flag变为flag{XXX}形式提交。
It must be easy , don’t have shell;
Gdb:
Given is the flag, but no matter how to submit is wrong;
Go back to the prompt and think about it carefully, and find that SHA1 encryption is given;
Let’s having a try:
That’s right ! flag get!
flag{80ee2a3fe31da904c596d993f7f1de4827c1450a}
这篇关于秃头逆向刷题21-4-27的文章就介绍到这儿,希望我们推荐的文章对编程师们有所帮助!