[RE] BabySmc - cew xp0int Posted on Sep 12 2021 调试时把解密数据dump下来,patch源程序即可F5得到伪代码。主要逻辑就是魔改base64,变表+异或。 ``` xor_key = [0xa6, 0xa3, 0xa9, 0xac] table = [228, 196, 231, 199, 230, 198, 225, 193, 224, 192, 227, 195, 226, 194, 237, 205, 236, 204, 239, 207, 238, 206, 233, 201, 232, 200, 235, 203, 234, 202, 245, 213, 244, 212, 247, 215, 246, 214, 241, 209, 240, 208, 243, 211, 242, 210, 253, 221, 252, 220, 255, 223, 149, 156, 157, 146, 147, 144, 145, 150, 151, 148, 138, 142] en = list(b"H>oQn6aqLr{DH6odhdm0dMe`MBo?lRglHtGPOdobDlknejmGI|ghDb<4") en = [en[_] ^ xor_key[_%4] for _ in range(len(en))][:-1] # print(en) en = [bin(table.index(_))[2:].rjust(6, '0') for _ in en] en = ''.join(en) # print(len(en)) # assert len(en) % 8 == 0 for i in range(0, len(en), 8): print(chr(int(en[i:i+8], 2)), end='') ``` FLAG:SangFor{XSAYT0u5DQhaxveIR50X1U13M-pZK5A0} 打赏还是打残,这是个问题 赏 Wechat Pay Alipay [RE] OddCode - cew [PWN] Whats your name - xf1les
没有帐号? 立即注册