-
-
[原创]看雪CTF.TSRC 2018 团队赛 - 初世纪
-
2018-12-1 12:41 1532
-
关键代码如下:
.text:000000014000148B call cs:GetDlgItemTextA .text:0000000140001491 cmp ebx, 6 .text:0000000140001494 jnz short loc_1400014F1 .text:0000000140001496 movzx eax, [rsp+130h+Dst] .text:000000014000149B sub eax, 30h .text:000000014000149E cmp eax, ebx .text:00000001400014A0 jnz short loc_1400014F1 .text:00000001400014A2 movzx eax, [rsp+130h+var_CF] .text:00000001400014A7 sub eax, 40h .text:00000001400014AA cmp eax, 5 .text:00000001400014AD jnz short loc_1400014F1 .text:00000001400014AF movzx eax, [rsp+130h+var_CE] .text:00000001400014B4 sub eax, 70h .text:00000001400014B7 cmp eax, 7 .text:00000001400014BA jnz short loc_1400014F1 .text:00000001400014BC movzx eax, [rsp+130h+var_CD] .text:00000001400014C1 sub eax, 60h .text:00000001400014C4 cmp eax, 9 .text:00000001400014C7 jnz short loc_1400014F1 .text:00000001400014C9 movzx eax, [rsp+130h+var_CC] .text:00000001400014CE sub eax, 30h .text:00000001400014D1 cmp eax, 9 .text:00000001400014D4 jnz short loc_1400014F1 .text:00000001400014D6 movzx eax, [rsp+130h+var_CB] .text:00000001400014DB lea rcx, String1 .text:00000001400014E2 sub eax, 40h .text:00000001400014E5 cmp eax, 8 .text:00000001400014E8 jnz short loc_1400014F8 .text:00000001400014EA lea rdx, [rsp+130h+var_E8] .text:00000001400014EF jmp short loc_1400014FD .text:00000001400014F1 ; ----------------------------------------------
读入key的长度为6,ascii值分别为:0x36, 0x45, 0x77, 0x69, 0x39, 0x48;
转换成字符串:6Ewi9H
[CTF入门培训]顶尖高校博士及硕士团队亲授《30小时教你玩转CTF》,视频+靶场+题目!助力进入CTF世界
赞赏
他的文章
看原图