CTF-All-In-One/doc/6.4_writeup.md
firmianay bb403d3303 fix
2017-08-16 21:49:30 +08:00

2.5 KiB

6.4 习题答案

5.2 Pin 动态二进制插桩

Baleful - picoCTF 2014

Reverse 400 - Hack You 2014

wyvern 500 - CSAW CTF 2015

rev100 - th3jackers CTF 2015

6.1 更多 Linux 工具

Strings - strings_crackme

[firmy@Reverse]$ strings -e L strings_crackme
w0wgreat

Strings - flag_pwnablekr

[firmy@Reverse]$ ./flag_pwnablekr
I will malloc() and strcpy the flag there. take it.
[firmy@Reverse]$ strings flag_pwnablekr | grep UPX
UPX!
$Info: This file is packed with the UPX executable packer http://upx.sf.net $
$Id: UPX 3.08 Copyright (C) 1996-2011 the UPX Team. All Rights Reserved. $
UPX!
UPX!
[firmy@Reverse]$ upx -d flag_pwnablekr
                       Ultimate Packer for eXecutables
                          Copyright (C) 1996 - 2017
UPX 3.94        Markus Oberhumer, Laszlo Molnar & John Reiser   May 12th 2017
        File size         Ratio      Format      Name
   --------------------   ------   -----------   -----------
    883745 <-    335288   37.94%   linux/amd64   flag_pwnablekr
Unpacked 1 file.
[firmy@Reverse]$ strings flag_pwnablekr | grep -i upx
UPX...? sounds like a delivery service :)

xxd - xxd_crackme

[firmy@Reverse]$ xxd -g1 xxd_crackme
......
00001020: 00 00 00 00 67 30 30 64 4a 30 42 21 00 00 00 00  ....g00dJ0B!....
......
[firmy@Reverse]$ strings -d xxd_crackme
......
g00dJ0B!
......