BaseCTF-re
You are good at IDA
直接按F5得到一地段flag
Y0u_4Re_
第二段提示F12
双击打开
按x
900d_47_
最后一段提示在Interesting函数之中
id4
BaseCTF{Y0u_4Re_900d_47_id4}
UPX mini
先脱壳
拖入IDA,base64解码就好
BasePlus
F5
找到key0xE
base64换表+异或
BaseCTF{BA5e_DEcoD1N6_sEcr3t}
UPX
脱壳不了
小写的upx改大写
base64换表
用官方的脚本跑一下吧...
import base64
import string
enc = "$rg7_dhd~Alidg+zeyhz`vnz_d,7sy0="
string1 = 'A,.1fgvw#`/2ehux$~"3dity%_;4cjsz^+{5bkrA&=}6alqB*-[70mpC()]89noX'
string2 = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/"
print (base64.b64decode(enc.translate(str.maketrans(string1,string2))))
BaseCTF{UPX_1s_$o_e@sy}
标签:47,base64,4Re,re,2024BaseCTF,BaseCTF,UPX,IDA From: https://www.cnblogs.com/WTT001/p/18550256