首页
社区
课程
招聘
[原创]签到题 身在何处 python3 解题脚本
2021-11-16 12:41 1648

[原创]签到题 身在何处 python3 解题脚本

2021-11-16 12:41
1648
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
usr = b"KCTF"
usr_len = 4
v16 = [0] * 256
i = 0
for i in range(256):
    v3 = i >> 1
    if ( (i & 1) != 0 ) :
        v3 ^= 0xEDB88320
    if ( (v3 & 1) != 0 ) :
      v4 = (v3 >> 1) ^ 0xEDB88320
    else :
      v4 = v3 >> 1
    if ( (v4 & 1) != 0 ) :
      v5 = (v4 >> 1) ^ 0xEDB88320
    else :
      v5 = v4 >> 1
    if ( (v5 & 1) != 0 ) :
      v6 = (v5 >> 1) ^ 0xEDB88320
    else :
      v6 = v5 >> 1
    if ( (v6 & 1) != 0 ) :
      v7 = (v6 >> 1) ^ 0xEDB88320
    else :
      v7 = v6 >> 1
    if ( (v7 & 1) != 0 ) :
      v8 = (v7 >> 1) ^ 0xEDB88320
    else :
      v8 = v7 >> 1
    if ( (v8 & 1) != 0 ) :
      v9 = (v8 >> 1) ^ 0xEDB88320
    else :
      v9 = v8 >> 1
    if ( (v9 & 1) != 0 ) :
      v10 = (v9 >> 1) ^ 0xEDB88320
    else :
      v10 = v9 >> 1
    v16[i] = v10
 
i = 0
j = -1
while usr_len :
    j = v16[(j ^ usr[i]) & 0xff] ^ (j >> 8 & 0x00ffffff)
    usr_len -= 1
    i += 1
 
print(hex((~j) & 0xffffffff))
 
pwd_str2int = (~j) & 0xffffffff ^ 0x52A1ED5A
 
print(pwd_str2int)

[培训]《安卓高级研修班(网课)》月薪三万计划,掌握调试、分析还原ollvm、vmp的方法,定制art虚拟机自动化脱壳的方法

收藏
点赞0
打赏
分享
最新回复 (0)
游客
登录 | 注册 方可回帖
返回