-
-
[原创] 第一题 Helllo-CTF----So easy!
-
2017-10-25 11:31 1936
-
```
asm
00401845 |. 68 98354000 push hello.00403598 ; 请输入pass!
0040184A |. 8B4D FC mov ecx,[local.1]
0040184D |. E8 C0050000 call <jmp.&MFC42.#4224>
00401852 |. EB 21 jmp short hello.00401875
00401854 |> 68 80354000 push hello.00403580 ; /WelcomeToKanXueCtf2017
00401859 |. 8B55 F8 mov edx,[local.2] ; |
0040185C |. 52 push edx ; |s1 = "1234"
0040185D |. E8 2E060000 call <jmp.&MSVCRT.strcmp> ; \strcmp
00401862 |. 83C4 08 add esp,0x8
00401865 |. 85C0 test eax,eax
00401867 |. 75 07 jnz short hello.00401870 ; point
00401869 |. E8 02FFFFFF call hello.00401770 ; right
0040186E |. EB 05 jmp short hello.00401875
00401870 |> E8 3BFFFFFF call hello.004017B0 ; wrong
```
[培训]二进制漏洞攻防(第3期);满10人开班;模糊测试与工具使用二次开发;网络协议漏洞挖掘;Linux内核漏洞挖掘与利用;AOSP漏洞挖掘与利用;代码审计。
赞赏
看原图