Hitcon-training
git clone https://github.com/scwuaptx/HITCON-Training.git
已有环境,git克隆到当前目录
HITCON
lab1 | 多种解法
buf=v2,则异或打印flag,但是buf无法被v2覆盖,所以无法从输入端控制,但是异或的v54的用char显示,根据小端模式,推知Do_y,即输入(0x44 6F5F79)=>0x795f6f44(内存中/栈中)=>(y_oD),所以用python复原字符串
list=[0x795f6f44,0x6B5F756F,0x5F776F6E,0x5F796877,0x745F796D,0x6D6D6165,0x5F657461,0x6E61724F, 0x695F6567,0x6F735F73,0x676E615F,0x3F3F7972] #0x3f |
以上是python对字符串的复原,复原即下方的key
|
还可以gdb调试