-
-
ctf2018-第4题
-
发表于:
2018-6-22 15:32
3821
-
创建子进程, 子进程会结束父进程, 子进程中g_v = 1
1 2 | .text:004031D7 call x_check_if_spawn_child
.data:00495728 g_v dd 0
|
1 2 | .text:004031D7 call x_check_if_spawn_child
.data:00495728 g_v dd 0
|
sn分成两部分, 记为part1, part2
检测part2
rsa_n: 7da39de66016477b1afc3dc8e309dc429b5de855f0d616d225b570b68b88a585
rsa_e: 3e9
rsa_enc(part2) == 208CBB7CD6ECC64516D07D978F5F0681F534EAD235D5C49ADD72D2DB840D5304
1 2 3 4 5 6 7 | .text:00403237 push eax
.text:00403238 push offset g_sn_part2
.text:0040323D lea edx, [ebp+var_38+3]
.text:00403240 push edx
.text:00403241 call x_bin_to_hex
.text:00403246 add esp, 0Ch
.text:00403249 call x_rsa_check
|
yafu分解rsa_n: factor(56828191929550499896142468009756520490526164668720784286547535509684830643589)
P39 = 208096057845685678782766058500526476379
P39 = 273086345401562743300402731618892888991
1 2 3 4 5 6 7 | .text:00403237 push eax
.text:00403238 push offset g_sn_part2
.text:0040323D lea edx, [ebp+var_38+3]
.text:00403240 push edx
.text:00403241 call x_bin_to_hex
.text:00403246 add esp, 0Ch
.text:00403249 call x_rsa_check
|
yafu分解rsa_n: factor(56828191929550499896142468009756520490526164668720784286547535509684830643589)
P39 = 208096057845685678782766058500526476379
P39 = 273086345401562743300402731618892888991
yafu分解rsa_n: factor(56828191929550499896142468009756520490526164668720784286547535509684830643589)
P39 = 208096057845685678782766058500526476379
P39 = 273086345401562743300402731618892888991
rsa_d: 2E70A649E6A648F78A9D2C1074A7D51F0099C13F7F9BCBB78BAD2C1B1B1D96F1
part2=iamahandsomeguyhaha1
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课
最后于 2018-6-22 16:24
被风间仁编辑
,原因: