-
-
[原创]看雪CTF.TSRC 2018 团队赛 - 初世纪
-
发表于: 2018-12-1 12:41 2012
-
关键代码如下:
.text:000000014000148B call cs:GetDlgItemTextA .text:0000000140001491 cmp ebx, 6 .text:0000000140001494 jnz short loc_1400014F1 .text:0000000140001496 movzx eax, [rsp+130h+Dst] .text:000000014000149B sub eax, 30h .text:000000014000149E cmp eax, ebx .text:00000001400014A0 jnz short loc_1400014F1 .text:00000001400014A2 movzx eax, [rsp+130h+var_CF] .text:00000001400014A7 sub eax, 40h .text:00000001400014AA cmp eax, 5 .text:00000001400014AD jnz short loc_1400014F1 .text:00000001400014AF movzx eax, [rsp+130h+var_CE] .text:00000001400014B4 sub eax, 70h .text:00000001400014B7 cmp eax, 7 .text:00000001400014BA jnz short loc_1400014F1 .text:00000001400014BC movzx eax, [rsp+130h+var_CD] .text:00000001400014C1 sub eax, 60h .text:00000001400014C4 cmp eax, 9 .text:00000001400014C7 jnz short loc_1400014F1 .text:00000001400014C9 movzx eax, [rsp+130h+var_CC] .text:00000001400014CE sub eax, 30h .text:00000001400014D1 cmp eax, 9 .text:00000001400014D4 jnz short loc_1400014F1 .text:00000001400014D6 movzx eax, [rsp+130h+var_CB] .text:00000001400014DB lea rcx, String1 .text:00000001400014E2 sub eax, 40h .text:00000001400014E5 cmp eax, 8 .text:00000001400014E8 jnz short loc_1400014F8 .text:00000001400014EA lea rdx, [rsp+130h+var_E8] .text:00000001400014EF jmp short loc_1400014FD .text:00000001400014F1 ; ----------------------------------------------
读入key的长度为6,ascii值分别为:0x36, 0x45, 0x77, 0x69, 0x39, 0x48;
转换成字符串:6Ewi9H
[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)
赞赏
他的文章
- [原创]初入好望角WriteUp 2830
- [原创]流浪者WriteUp 2962
- [原创]看雪CTF.TSRC 2018 团队赛 - 半加器Writeup 2775
- [原创]看雪CTF.TSRC 2018 团队赛 - 初世纪 2013
- [原创]第十五题 智能设备WriteUp 6573
看原图
赞赏
雪币:
留言: