[61dctf] androideasy

SRE实战 互联网时代守护先锋,助力企业售后服务体系运筹帷幄!一键直达领取阿里云限量特价优惠。

164求解器

50

相反

ctf study of jarvisoj reverse Safe 第1张

脚本如下:

s=''

a=113, 123, 118, 112, 108, 94, 99, 72, 38, 68, 72, 87, 89, 72, 36, 118, 100, 78, 72, 87, 121, 83, 101, 39, 62, 94, 62, 38, 107, 115, 106 

for i in range(len(a)):

   s+=chr(a[i]^(0x17))

print(s)

[61dctf] stheasy

192求解器

100

相反

ctf study of jarvisoj reverse Safe 第2张

ctf study of jarvisoj reverse Safe 第3张

脚本如下:

s=""

a=[0x48,0x5D,0x8D,0x24,0x84,0x27,0x99,0x9F,0x54,0x18

,0x1E,0x69,0x7E,0x33,0x15,0x72,0x8D,0x33,0x24,0x63,,0x21,0x54,0x0C,0x78,0x78,0x78,0x78,0x78,0x1B]

b=[]

c='lk2j9Gh}AgfY4ds-a6QW1#k5ER_T[cvLbV7nOm3ZeX{CMt8SZo]U'

for i in range(len(a)):

  b.append(int(a[i]/3-2))

for j in range(len(b)):

  s+=c[b[j]]

print (s)

Flag 是下一关的邮箱地址(以 DD 开头)。

1.Hello.12b9bde7c0c8558a9da42aa1798cafc8

DD - Hello

129 SOLVERS

100

REVERSE

You have solved this Challenge

ctf study of jarvisoj reverse Safe 第4张

ctf study of jarvisoj reverse Safe 第5张

脚本如下:

cip=[0x41, 0x10, 0x11, 0x11, 0x1B, 0x0A, 0x64, 0x67, 0x6A, 0x68, 0x62, 0x68, 0x6E, 0x67, 0x68, 0x6B, 0x62, 0x3D, 0x65, 0x6A, 0x6A, 0x3D, 0x68, 0x4, 0x5, 0x8, 0x3, 0x2, 0x2, 0x55, 0x8, 0x5D, 0x61, 0x55, 0x0A, 0x5F, 0x0D, 0x5D, 0x61, 0x32, 0x17, 0x1D, 0x19, 0x1F, 0x18, 0x20, 0x4, 0x2, 0x12, 0x16, 0x1E, 0x54, 0x20, 0x13, 0x14, 0x0, 0x0]

start=0x100000CB0

end=0x100000C90

v2=((start-end)>>2)^cip[0]

for i in range(55):
  cip[i]-=2
  cip[i]^=v2
  v2+=1

s=''

for j in cip:

  s+=chr(j)

print(s)
扫码关注我们
微信号:SRE实战
拒绝背锅 运筹帷幄