-
-
[原创]第一题:writeup
-
发表于: 2018-6-17 15:19 2056
-
ida反编译 kxctf.exe,分析后发现:
_main proc near ; ....... .text:0040100C mov esi, offset a437261636b4d65 ; "437261636b4d654a757374466f7246756e" //密码保存处:CrackMeJustForFun .text:00401011 lea edi, [esp+70h+var_24] loc_4010B0: .text:004010B0 lea esi, [esp+70h+var_24] //密码保存处 .text:004010B4 lea eax, [esp+70h+var_48] //屏幕输入 loc_4010B8: .text:004010B8 mov dl, [eax] .text:004010BA mov bl, [esi] .text:004010BC mov cl, dl .text:004010BE cmp dl, bl .text:004010C0 jnz short loc_4010E0 //某个字符不相等,转loc_4010E0,报错:wrong .text:004010C2 test cl, cl .text:004010C4 jz short loc_4010DC //整个字符串都想等,转loc_4010DC,打印:success .text:004010C6 mov dl, [eax+1] .text:004010C9 mov bl, [esi+1] .text:004010CC mov cl, dl .text:004010CE cmp dl, bl .text:004010D0 jnz short loc_4010E0 .text:004010D2 add eax, 2 .text:004010D5 add esi, 2 .text:004010D8 test cl, cl .text:004010DA jnz short loc_4010B8
运行 kxctf.exe,输入:CrackMeJustForFun,提示:success
[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)
赞赏
看原图
赞赏
雪币:
留言: