BabyRE
0x00 Routine Shell Check
xml逆向
0x01嗯看
稍加翻阅不难发现又只是个异或加密,可以通过gpt翻译能得到大概的加密
于是我们可以拿到test密文直接拿到test flag,然而去拿真密文的时候发现顺序有点迷惑,让gpt模拟也模拟不好,于是发现一共神奇的工具
直接可以让程序跑起来,然后拿到密文变量
0x02 Get Flag
1 | data = [102,10,13,6,28,20,48,44,27,1,29,43,54,54,59,11,1,26,43,52,5,1,24,40,43,28,9,21,9] |

🍬

🍪
About this Post
This post is written by P.Z, licensed under CC BY-NC 4.0.