[青少年CTF练习平台]Lihua‘s for
下载附件之后直接IDA启动
查看dword_403040指向的内容,全是数据,提取出来
分析完成写脚本
flag = ""
temdata = [0x00000066, 0x0000006D, 0x00000063, 0x00000064, 0x0000007F, 0x00000064, 0x00000032, 0x00000036, 0x0000006A, 0x0000006C, 0x0000003E, 0x0000003D, 0x00000039, 0x00000020, 0x0000006F, 0x0000003A, 0x00000020, 0x00000077, 0x0000003F, 0x00000027, 0x00000025, 0x00000027, 0x00000022, 0x0000003A, 0x0000007A, 0x0000002E, 0x00000078, 0x0000007A, 0x00000031, 0x0000002F, 0x00000029, 0x00000029, 0x00000016, 0x00000040, 0x00000044, 0x00000045, 0x00000012, 0x00000047, 0x00000047, 0x00000041, 0x0000001A, 0x00000054]
print(len(temdata))
for i in range(42):
flag+=chr(i ^ temdata[i])
print(flag)
>>>
42
flag{a41be465-a50f-4124-b7ba-2766aff6baf2}