当前位置:网站首页>xtu-ctf Challenges-Reverse 1、2
xtu-ctf Challenges-Reverse 1、2
2022-07-23 11:32:00 【GSflyy】
I have always been interested in network security , But the technology is still unable to get started , Thinking that winter vacation may enable me to officially enter the learning road of network security , The senior said that the tutorial is secondary after all , Brushing questions is fundamental , Now I send you two reverse A simple solution to the problem , My little white level , At present, it is still in the exploratory stage , I hope you guys spray gently
1.FIRST
Title address :http://172.22.114.206:8000/challenges#First
The title has attachments , After downloading, the file name is First.exe
In the PEID Check whether there is a shell , Check no shell , Ready to put directly ida, Start to reverse 
open 32 Bit ida, Select the default loading method 
good , Officially come to the program execution interface 
Direct routine operation , Find string 

Suspicious string found , Double click to the program address where the string is located 
Double click the arrow again , A program execution flowchart appears , There is no need to study , direct f5 Disassembly 
Take a look at the end of the program , There is one strcmp function , Obviously , When two strings are output at the same time congratulations, Then we just need to know what this string is
Inspection procedure , And write a similar program , Make it right str1 Strings do the opposite , You can get str2
Start writing 
Run it , Get the results 
This is it. flag 了
2.SECOND
Title address :http://172.22.114.206:8000/challenges#Second
The biggest difficulty of this problem is to shell …
Also download the source file , Put in PEID Check the shell 
It can be seen that there is a shell , however upx Shell is a relatively simple shell , There are some tools on the Internet that can be shelled directly ( At first I thought od Bypassing the shell , But the technology is not good , I have to find tools )
UPXtools
here , It's like this , Drag the files to be shelled in , Click decompress and then click start , Will generate a shelled file
PEID Check again , See if the shelling is successful 
Good success , Put it in as usual ida Check 
The same is true for the general operation of querying strings , As expected, I found congratulations
Find the same congratulations Part of the program ,f5 After anti compilation, pseudo c as follows :
It doesn't matter if the front doesn't show , It does not affect the reader's understanding of the meaning of the latter part of the program , Compare two strings , If it is identical, output congratulations
therefore , Also write a c Just run the program :
Run it ,flag And then there is 
These two questions are not difficult , The main thing is to have the corresponding tools and master the method of using the tools , Solve the problem and get caught .
边栏推荐
- 解决手动查询Oracle数据库时间格式不正确的问题(DATE类型)
- php+码云 代码钩子自动更新线上代码
- TypeScript介绍
- js的事件执行机制(Event loop)
- 数字藏品系统开发:百度AI致敬中国航空
- Nepctf 2022 misc < check in question > (extreme doll)
- 动态设置卡片的主题色
- TypeScript 高级类型
- 美联储布拉德:上周就业报告表明美国经济稳健,可以承受更高的利率
- [C language] what is a function? Classification and emphasis of functions (help you quickly classify and remember functions)
猜你喜欢
随机推荐
composer的一些操作
Principle of file upload vulnerability
js中类数组对象以及类数组转换的方法(ES6, ES5)
用getchar清理缓冲区(强烈推荐,C语言易错典型)
MySQL之账号管理&&四大引擎&&建库建表
Inheritance mode of JS
pycharm如何正确打包ocr且让打包出来的exe尽量小
First blog
解决手动查询Oracle数据库时间格式不正确的问题(DATE类型)
flex+js实现内部盒子高度跟随其中最大的高度
JS event loop
Py program can run, but the packaged exe prompts an error: recursion is detected when loading the "CV2" binary extension. Please check the opencv installation.
Flex+js realizes that the height of the internal box follows the maximum height
DVWA学习笔记
Common errors in C language debugging -- brief answer
js的事件执行机制(Event loop)
【6.28】
$attrs中的对象没有变化,但触发了watch监听?
构造函数,原型链,instanceOf
NFT数字藏品系统开发:音乐和NFT的结合









