-
-
[原创]第一题:writeup
-
发表于: 2018-6-17 15:19 2157
-
ida反编译 kxctf.exe,分析后发现:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 | _main proc near ; ....... .text:0040100C mov esi, offset a437261636b4d65 ; "437261636b4d654a757374466f7246756e" //密码保存处:CrackMeJustForFun .text:00401011 lea edi, [esp+70h+var_24] loc_4010B0: .text:004010B0 lea esi, [esp+70h+var_24] //密码保存处 .text:004010B4 lea eax, [esp+70h+var_48] //屏幕输入 loc_4010B8: .text:004010B8 mov dl, [eax] .text:004010BA mov bl, [esi] .text:004010BC mov cl, dl .text:004010BE cmp dl, bl .text:004010C0 jnz short loc_4010E0 //某个字符不相等,转loc_4010E0,报错:wrong .text:004010C2 test cl, cl .text:004010C4 jz short loc_4010DC //整个字符串都想等,转loc_4010DC,打印:success .text:004010C6 mov dl, [eax+1] .text:004010C9 mov bl, [esi+1] .text:004010CC mov cl, dl .text:004010CE cmp dl, bl .text:004010D0 jnz short loc_4010E0 .text:004010D2 add eax, 2 .text:004010D5 add esi, 2 .text:004010D8 test cl, cl .text:004010DA jnz short loc_4010B8 |
运行 kxctf.exe,输入:CrackMeJustForFun,提示:success
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课
赞赏
赞赏
雪币:
留言: