当前位置:网站首页>RE1 attack and defense world reverse
RE1 attack and defense world reverse
2022-07-07 23:18:00 【Day-3】
This question has no shell , Throw in IDA Check the source code , The source code is confusing , After modification, it is shown as follows :
int __cdecl main(int argc, const char **argv, const char **envp)
{
int v3; // eax
char v5[32]; // [esp+0h] [ebp-44h] BYREF
char v6[32]; // [esp+20h] [ebp-24h] BYREF
*(__m128i *)v5 = _mm_loadu_si128((const __m128i *)&xmmword_633E34);
*(_DWORD *)&v5[24] = 0;
strcpy(&v5[16], "DUTCTF}");
*(_WORD *)&v5[28] = 0;
printf(" Welcome to DUTCTF yo \n");
printf(&byte_633E60);
printf(" Input flag Well :");
scanf("%s", v6);
v3 = strcmp(v5, v6);
if ( v3 )
v3 = v3 < 0 ? -1 : 1;
if ( v3 )
printf("flag Not quite right , Try again , Come on \n");
else
printf("flag get√\n");
system("pause");
return 0;
}
At this time, the code logic is relatively clear , It is to compare the content we input with the content it generates , The same is deemed to be submitted accurately flag, At this time, our task is to check v5 The content in , So we do dynamic debugging , It's easy to find flag.
边栏推荐
- Unity3D学习笔记5——创建子Mesh
- UE4_UE5蓝图command节点的使用(开启关闭屏幕响应-log-发布全屏显示)
- Dynamics 365 find field filtering
- Handling file exceptions
- Anta DTC | Anta transformation, building a growth flywheel that is not only FILA
- Introduction to anomaly detection
- Kubernetes' simplified data storage storageclass (creation, deletion and initial use)
- 1. Sum of two numbers
- Network security - Eternal Blue
- Network security -burpsuit
猜你喜欢
微信论坛交流小程序系统毕业设计毕设(6)开题答辩PPT
Anta DTC | Anta transformation, building a growth flywheel that is not only FILA
Wechat forum exchange applet system graduation design completion (4) opening report
iNFTnews | Web5 vs Web3:未来是一个过程,而不是目的地
30讲 线性代数 第五讲 特征值与特征向量
Inftnews | web5 vs Web3: the future is a process, not a destination
Unity3D学习笔记5——创建子Mesh
Software test classification
Installing spss25
UE4_UE5蓝图command节点的使用(开启关闭屏幕响应-log-发布全屏显示)
随机推荐
When copying something from the USB flash disk, an error volume error is reported. Please run CHKDSK
Unity dynamically merges mesh textures
Network security - phishing
Install a new version of idea. Double click it to open it
十四、数据库的导出和导入的两种方法
位运算(Bit Operation)
USB(十五)2022-04-14
微信论坛交流小程序系统毕业设计毕设(3)后台功能
微信论坛交流小程序系统毕业设计毕设(4)开题报告
微信论坛交流小程序系统毕业设计毕设(2)小程序功能
Specific method example of V20 frequency converter manual automatic switching (local remote switching)
微信论坛交流小程序系统毕业设计毕设(5)任务书
Talk about the design and implementation logic of payment process
Brush question 4
三菱PLC slmp(mc)协议
ArcGIS:字段赋值_属性表字段计算器(Field Calculator)依据条件为字段赋值
USB (十七)2022-04-15
Inftnews | the wide application of NFT technology and its existing problems
Network security sqlmap and DVWA explosion
iNFTnews | Web5 vs Web3:未来是一个过程,而不是目的地