七夕杯-re-wp
0x01 逆向签到
看汇编就可以看到字符串,小端序倒序一下转字符串就解得了
exp如下:
a = [0x5F,0x79,0x73,0x61,0x65,0x5F,0x73,0x69]
b = [0x7B,0x77,0x6F,0x68,0x73,0x66,0x74,0x63]
c = [0x5F,0x6E,0x67,0x69,0x73,0x5F,0x65,0x72]
a.reverse()
b.reverse()
c.reverse()
flag = ""
for i in b:
flag += chr(i)
for i in c:
flag += chr(i)
for i in a:
flag += chr(i)
print(flag+"}")
# ctfshow{re_sign_is_easy_}
flag:ctfshow{re_sign_is_easy_}
0x02 eazy_magic
非预期
直接拿到md5解密网站解密,可能是解出来的人多了一下子就出来了
sub_219B(v10, (__int64)s1);
看了wp才知道这个是md5加密的函数,意思就是s1就是flag,s2是md5加密后的flag,于是就直接去掉sub_219B函数,执行上面的代码就可以拿到flag了。
flag:ctfshow{7x_flag_is_here}