当前位置:网站首页>BUUCTF--reverse2
BUUCTF--reverse2
2022-06-29 09:26:00 【X.IO】
reverse2
1预处理
获得信息
64位文件
2.拖进IDA64,shift+F12
可以直接看到flag,可是这不是最终的flag,双击跟进
然后F5找到伪代码
分析伪代码,找到关键的函数
for ( i = 0; i <= strlen(&flag); ++i )
{
if ( *(&flag + i) == 105 || *(&flag + i) == 114 )
*(&flag + i) = 49;
}
注意:这里的105、114、49都是ASCII码,参考ASCII码表可知
105表示i 114表示r 49表示1
所以最终的flag是把flag中的i和r替换成1.
flag{hack1ng_fo1_fun}
边栏推荐
- 攻防世界-Re-insfsay
- 基辅周边的凄美废墟——切尔诺贝利的安全前往指南!
- 指针数组、数组指针和传参的相关问题
- HDU 6778 car (group enumeration -- > shape pressure DP)
- Talk about threads and concurrency
- MySQL中的alter table操作之add/modify/drop列
- Power strings [KMP cycle section]
- This open source project is super wow, and handwritten photos are generated Online
- 六度空间 bfs
- Text of the basic component of the shutter
猜你喜欢

两个栈的模拟题

Slide the custom control to close the activity control

通过Win32API调用另一界面的按钮

Recyclerview sticky (suspended) head

Ce projet Open source est super wow, des photos manuscrites sont générées en ligne

Win32Exception (0x80004005): 组策略阻止了这个程序。要获取详细信息,请与系统管理员联系。

云主机端口扫描

Web vulnerability manual detection and analysis

Download control 1 of custom control (downloadview1)

Beautiful ruins around Kiev -- a safe guide to Chernobyl!
随机推荐
Wandering --- 最后的编程挑战
winform使用zxing生成二维码
Win32exception (0x80004005): This program is blocked by group policy. For more information, contact your system administrator.
Acwing271 [teacher Yang's photographic arrangement] [linear DP]
Ural1517 freedom of choice [suffix array: longest common continuous substring]
Recyclerview sticky (suspended) head
1099 Build A Binary Search Tree (30 分)
2019.10.16 training summary
Dsolve function of sympy
Simulation problem of two stacks
Analysis of liferayportal jsonws deserialization vulnerability (cve-2020-7961)
mysql中的if [not] exists
函数指针、函数指针数组、计算器+转移表等归纳总结
Application of keil5 integrated development environment for single chip microcomputer
Maze walking BFS medium + -- the last programming challenge
2020-9-14 introduction to advertising system
std::unique_ptr<T>与boost::scoped_ptr<T>的特殊性
Analyze in detail the PBOT mining virus family behavior and the principle of exploited vulnerabilities, and provide detailed protection suggestions for the blue army
解决zxing的QR码包含中文时乱码的问题
Is it safe to open a stock account with the QR code given by the manager of a securities firm? I want to open an account