June 8, 2023

CISCN2023 REVERSE

BabyRE

0x00 Routine Shell Check

xml逆向

0x01嗯看

稍加翻阅不难发现又只是个异或加密,可以通过gpt翻译能得到大概的加密

image-20230608210238960

于是我们可以拿到test密文直接拿到test flag,然而去拿真密文的时候发现顺序有点迷惑,让gpt模拟也模拟不好,于是发现一共神奇的工具

https://snap.berkeley.edu/snap/snap.html

直接可以让程序跑起来,然后拿到密文变量

image-20230608211055241

0x02 Get Flag

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
data = [102,10,13,6,28,20,48,44,27,1,29,43,54,54,59,11,1,26,43,52,5,1,24,40,43,28,9,21,9]
doIstList = [102, 10, 13, 6, 28, 74, 3, 1, 3, 7, 85, 0, 4, 75, 20, 92, 92, 8, 28, 25, 81, 83, 7, 28, 76, 88, 9, 0, 29, 73, 0, 86, 4, 87, 87, 82, 84, 85, 4, 85, 87, 30]

print(chr(data[0]), end = "")
for i in range(1, len(data)):
data[i] ^= data[i - 1]
print(chr(data[i]), end = "")
print()

print(chr(doIstList[0]), end = "")
for i in range(1, len(doIstList)):
doIstList[i] ^= doIstList[i - 1]
print(chr(doIstList[i]), end = "")
# flag{o_shit_i_dont_know_that}
# flag{12307bbf-9e91-4e61-a900-dd26a6d0ea4c}
DASCTF X SU
🍬
HFCTF2022
🍪

About this Post

This post is written by P.Z, licensed under CC BY-NC 4.0.