xctf crackme
文件用ida打开
发现有壳,查壳发现nspack壳
我用工具没有成功,没办法只能手脱
脱壳参考这位大佬
脱壳成功
逻辑简单
最后贴上我的payload
a= [
0x00000012, 0x00000004, 0x00000008, 0x00000014, 0x00000024, 0x0000005C, 0x0000004A, 0x0000003D,
0x00000056, 0x0000000A, 0x00000010, 0x00000067, 0x00000000, 0x00000041, 0x00000000, 0x00000001,
0x00000046, 0x0000005A, 0x00000044, 0x00000042, 0x0000006E, 0x0000000C, 0x00000044, 0x00000072,
0x0000000C, 0x0000000D, 0x00000040, 0x0000003E, 0x0000004B, 0x0000005F, 0x00000002, 0x00000001,
0x0000004C, 0x0000005E, 0x0000005B, 0x00000017, 0x0000006E, 0x0000000C, 0x00000016, 0x00000068,
0x0000005B, 0x00000012,0x48,0x0e]
s="this_is_not_flag"
flag=''
for i in range(42):
flag+=chr(ord(s[i%16])^a[i])
print(flag)
总结:这道题逻辑还是比较简单的,主要还是脱壳要成功