当前位置:网站首页>buu_ re_ crackMe
buu_ re_ crackMe
2022-07-02 02:42:00 【Child_ K1ng】
This topic mainly focuses on simple bypass anti debugging , Evaluation combined with dynamic debugging .
Check the shell
Shell less 32 position
ida analysis
Enter your username and password .
Find out Flower instruction , Can't decompile .
take jbe and aaa That line nop fall , These data will also be generated nop fall .
Finally get this .
Select all the addresses marked red on the left , Press p Declared as a function , Open the function and find Congratulations, And then Please try again, And back to result The value is 1, therefore v3==1.( The following picture is incomplete )
analysis sub_401830 function 
I found that there are many anti debugging things , There are probably four .
Because of these things , If we go straight debug Can't get the right result .
Bypass anti debugging
First position the cursor on the line with anti debugging pseudo code , Press Tab key , Right click after jump and select Text view, In this way, the assembly instructions can be modified , So as to remove the interference of anti debugging code .
Put... In the picture above jz The order was changed to jmp Instructions ,jmp The corresponding operation code is 0xE8. Empathy , Change the other places too . Finally, don't forget patch into file!!!
After completion, you can review the execution flow , Found that the anti debugging code disappeared , Bypass all .
Dynamic debugging byte_416050 Array
The following figure shows the lower breakpoint . The first one is the position of the array we are looking for , It is also the key code ; In Chapter 2, we find that this array is stored in ecx To carry out exclusive or , When debugging, only watch ecx The content in .
We know the user name , So type , Enter a random set of strings for the password .
then F8 Single step , observe ecx Value .
Finally get byte_416050 The value is 0x2a, 0xd7, 0x92, 0xe9, 0x53, 0xe2, 0xc4, 0xcd
EXP
byte_C26050 = [0x2a, 0xd7, 0x92, 0xe9, 0x53, 0xe2, 0xc4, 0xcd]
v17 = 'dbappsec'
flag=''
for i in range(len(byte_C26050)):
flag += hex(byte_C26050[i] ^ ord(v17[i]))[2:]
print(flag)
#4eb5f3992391a1ae
Carry out the results according to the topic MD5 encryption , obtain flag.
flag{d2be2981b84f2a905669995873d6a36c}
For details, please refer to the blogger's wp, It's well written and more specific .
BUUCTF crackMe Answer key .
边栏推荐
- 【带你学c带你飞】day 5 第2章 用C语言编写程序(习题2)
- Which brand of running headphones is good? How many professional running headphones are recommended
- Realize the code scanning function of a custom layout
- QT使用sqllite
- 結婚後
- Kibana操控ES
- Oracle creates a user with read-only permission in four simple steps
- Sword finger offer 47 Maximum value of gifts
- Deployment practice and problem solving of dash application development environment based on jupyter Lab
- Pat a-1165 block reversing (25 points)
猜你喜欢
【带你学c带你飞】1day 第2章 (练习2.2 求华氏温度 100°F 对应的摄氏温度
使用 useDeferredValue 进行异步渲染
Is bone conduction earphone better than traditional earphones? The sound production principle of bone conduction earphones is popular science
Connected block template and variants (4 questions in total)
Sword finger offer 62 The last remaining number in the circle
Query word weight, search word weight calculation
No programming code technology! Four step easy flower store applet
Missing numbers from 0 to n-1 (simple difficulty)
Multi threaded query, double efficiency
CVPR 2022 | 大连理工提出自校准照明框架,用于现实场景的微光图像增强
随机推荐
Calculation (computer) code of suffix expression
Missing numbers from 0 to n-1 (simple difficulty)
Pychart creates new projects & loads faster & fonts larger & changes appearance
The middle element and the rightmost element of the shutter
STM32__ 05 - PWM controlled DC motor
Basic 01: print string
Types of exhibition items available in the multimedia interactive exhibition hall
Summary of some experiences in the process of R & D platform splitting
【带你学c带你飞】day 5 第2章 用C语言编写程序(习题2)
批量检测url是否存在cdn—高准确率
The wave of layoffs in big factories continues, but I, who was born in both non undergraduate schools, turned against the wind and entered Alibaba
結婚後
Decipher the AI black technology behind sports: figure skating action recognition, multi-mode video classification and wonderful clip editing
Bash bounce shell encoding
Sword finger offer 47 Maximum value of gifts
What are the characteristics of common web proxy IP
MongoDB非关系型数据库
Oracle creates a user with read-only permission in four simple steps
Deployment practice and problem solving of dash application development environment based on jupyter Lab
2022 low voltage electrician test question simulation test question bank simulation test platform operation