实验室每日一题
程序员文章站
2022-04-01 13:02:29
实验室每日一题 2020.11.281.解压后先打开txt,里面有一串Brainfuck编码,直接上在线网站https://www.splitbrain.org/services/ook解密,得到压缩包密码。2.输入密码解压后还是一个压缩包一个txt,txt中是一个c++程序,然后就是写代码逆向:#include #include using namespace std;int main(){ char v11[4];...
实验室每日一题 2020.11.28
1.解压后先打开txt,里面有一串Brainfuck编码,直接上在线网站https://www.splitbrain.org/services/ook解密,得到压缩包密码。
2.输入密码解压后还是一个压缩包一个txt,txt中是一个c++程序,然后就是写代码逆向:
#include <iostream>
#include <stdlib.h>
using namespace std;
int main()
{
char v11[4];
char v12;
char v13;
char v14;
char v15;
char v16;
char v17;
char v18;
char v19;
char v20;
char v21;
char v22;
char v23;
v11[0] = 67;
v23 = 88;
v11[1] = 90;
v22 = 155 - v11[1];
v11[2] = 57;
v21 = 155 - v11[2];
v11[3] = 100;
v20 = 55;
v12 = 109;
v19 = 71;
v13 = 113;
v18 = 170 - v13;
v14 = 52;
v17 = 103;
v15 = 99;
v16 = 56;
cout<<v11[0]<<v11[1]<<v11[2]<<v11[3]<<v12<<v13<<v14<<v15<<v16<<v17<<v18<<v19<<v20<<v21<<v22<<v23<<endl;
system("pause");
return 0;
}
运行后得到压缩包密码。
3.输入密码后解压出一个txt,里面还是一个程序,这个感觉用python方便一些:
s = [0x66,0x0A,0x6B,0x0C,0x77,0x26,0x4F,0x2E,0x40,0x11,0x78,0x0D,0x5A,0x3B,0x55,0x11,0x70,0x19,0x46,0x1F,0x76,0x22,0x4D,0x23,0x44,0x0E,0x67,6,0x68,0x0F,0x47,0x32,0x4F]
flag = chr(s[0])
for i in range(1,len(s)):
flag += chr(s[i] ^ s[i-1])
print(flag)
4.运行后得到flag:flag{QianQiuWanDai_YiTongJiangHu}
本文地址:https://blog.csdn.net/wind_sail/article/details/110223524