SharkCTF-wp
rev
easyre
An easy asm, as we can see, every single byte
in the_second_array
is xored, and then plus the byte
with the same index in some_array
1 | BITS 64 |
So it’s easy to solve it with python using simple script blow
1 | target=[0x57,0x40,0xa3,0x78,0x7d,0x67,0x55,0x40,0x1e,0xae,0x5b,0x11,0x5d,0x40,0xaa,0x17,0x58,0x4f,0x7e,0x4d,0x4e,0x42,0x5d,0x51,0x57,0x5f,0x5f,0x12,0x1d,0x5a,0x4f,0xbf] |
z3_robot
Just input and then pass a few equations, so it’s quite easy to solve it with z3 as the title says
1 | from z3 import * |
secure_db
I can’t see anything using IDA so I debugged it and I found the input got processed and then compared with N3kviX7-vXEqvlp
, I just input this string and got an interesting string T4h7s_4ll_F0lks
which seems like to be the right one.
So this reversing algorithm seems to be itself, and I tried to rewrite it with python and I got the same answer
1 | target = "N3kviX7-vXEqvlp" |
Just input the key and we will get a database file from the server, and there is the flag.
miss_direction
Actually I haven’t solved it yet, I however managed to anti anti-debug (just remove tls table from PE headers will be fine), and then the exception handler really confused me,I can’t find anything to do with my input, I really got missed…
Comments