• 2021NSCTF RE WP


    题目

    链接:https://pan.baidu.com/s/1yt4LNXsk6kdfnaVjT4AsNQ
    提取码:py32

    ViolentScript.apk

    做法一

    AndroidKiller搜索flag{定位主函数

    一般题目字符串中没有flag时 从smali->com中找
    apk中original存放的是配置信息,res存放资源文件(图片视频之类),smali存放字节码文件,其中Android和Androidx为安卓库文件,com中存放的是用户自定义的包

    查看java源码

    package com.liyasoft.crackmea;
    
    import android.content.DialogInterface;
    import android.content.DialogInterface.OnClickListener;
    import android.os.Bundle;
    import android.support.v7.app.AlertDialog.Builder;
    import android.support.v7.app.AppCompatActivity;
    import android.view.View;
    import android.view.View.OnClickListener;
    import android.widget.Button;
    import android.widget.EditText;
    import java.security.MessageDigest;
    import java.security.NoSuchAlgorithmException;
    
    public class MainActivity
      extends AppCompatActivity
      implements View.OnClickListener
    {
      private static int[] mask = { 23, 1, 0, 1, 10, 17, 7, 90, 20 };
      private Button mButton;
      private EditText mPassword;
      private EditText mUsername;
      
      private static boolean checkUsername(String paramString)
      {
        boolean bool1 = true;
        int i = paramString.length();
        int j = 0;
        if (i == 9)
        {
          boolean bool2;
          for (;;)
          {
            bool2 = bool1;
            if (j >= 9) {
              break;
            }
            if ((paramString.charAt(j) ^ "miaomiao!".charAt(j)) != mask[j])
            {
              bool2 = false;
              break;
            }
            j++;
          }
          return bool2;
        }
        return false;
      }
      
      private static String getString(byte[] paramArrayOfByte)
      {
        StringBuilder localStringBuilder = new StringBuilder();
        for (int i = 0; i < paramArrayOfByte.length; i++) {
          localStringBuilder.append(paramArrayOfByte[i]);
        }
        return localStringBuilder.toString();
      }
      
      public static String hash(String paramString)
      {
        try
        {
          paramString = MessageDigest.getInstance("MD5").digest(paramString.getBytes());
          StringBuilder localStringBuilder = new java/lang/StringBuilder;
          localStringBuilder.<init>(40);
          int i = paramString.length;
          for (int j = 0; j < i; j++)
          {
            int k = paramString[j];
            if ((k & 0xFF) >> 4 == 0)
            {
              localStringBuilder.append("0");
              localStringBuilder.append(Integer.toHexString(k & 0xFF));
            }
            else
            {
              localStringBuilder.append(Integer.toHexString(k & 0xFF));
            }
          }
          paramString = localStringBuilder.toString();
          return paramString;
        }
        catch (NoSuchAlgorithmException paramString) {}
        return null;
      }
      
      private void initView()
      {
        this.mButton = ((Button)findViewById(2131230814));
        this.mUsername = ((EditText)findViewById(2131230915));
        this.mPassword = ((EditText)findViewById(2131230835));
        this.mButton.setOnClickListener(this);
      }
      
      private static boolean snCheck(String paramString)
      {
        if (paramString.length() != 32) {
          return false;
        }
        if ((paramString.toLowerCase().startsWith("27a3c22d01eb")) && (paramString.toLowerCase().endsWith("6ee8866aa5e5e7820"))) {
          try
          {
            boolean bool = hash(paramString).equalsIgnoreCase("271373f323d9f76dc31204ff19823fdf");
            return bool;
          }
          catch (Exception paramString)
          {
            return false;
          }
        }
        return false;
      }
      
      public void onClick(View paramView)
      {
        if (paramView.getId() == 2131230814)
        {
          AlertDialog.Builder localBuilder = new AlertDialog.Builder(this);
          Object localObject = this.mUsername.getText().toString();
          paramView = this.mPassword.getText().toString();
          if ((checkUsername((String)localObject)) && (snCheck(paramView)))
          {
            localObject = new StringBuilder();
            ((StringBuilder)localObject).append("恭喜,您登陆成功:flag{");
            ((StringBuilder)localObject).append(paramView);
            ((StringBuilder)localObject).append("}");
            localBuilder.setMessage(((StringBuilder)localObject).toString());
            localBuilder.setNegativeButton("确定", new DialogInterface.OnClickListener()
            {
              public void onClick(DialogInterface paramAnonymousDialogInterface, int paramAnonymousInt)
              {
                paramAnonymousDialogInterface.dismiss();
              }
            });
          }
          else
          {
            localBuilder.setMessage("用户名或密码不正确 密码就是答案哦!");
            localBuilder.setNegativeButton("确定", new DialogInterface.OnClickListener()
            {
              public void onClick(DialogInterface paramAnonymousDialogInterface, int paramAnonymousInt)
              {
                paramAnonymousDialogInterface.dismiss();
              }
            });
          }
          localBuilder.show();
        }
      }
      
      protected void onCreate(Bundle paramBundle)
      {
        super.onCreate(paramBundle);
        setContentView(2131427356);
        initView();
      }
    }
    

    根据提示密码就是flag,所以着重看snCheck

        if (paramString.length() != 32) {
          return false;
        }
        if ((paramString.toLowerCase().startsWith("27a3c22d01eb")) && (paramString.toLowerCase().endsWith("6ee8866aa5e5e7820"))) {
          try
          {
            boolean bool = hash(paramString).equalsIgnoreCase("271373f323d9f76dc31204ff19823fdf");
            return bool;
          }
    

    也就是paramString以27a3c22d01eb开头,6ee8866aa5e5e7820结尾,且长度为32位,还有中间3位需要爆破
    爆破脚本如下
    python:

    import hashlib
    
    nums1 = ["27a3c22d01eb"]
    nums2 = [0]*3
    nums3 = ["6ee8866aa5e5e7820"]
    str = "271373f323d9f76dc31204ff19823fdf"
    str2 = "0123456789abcdefjhigklmnopqrstuvwxyz"
    
    def computeMD5(message):
        m = hashlib.md5()
        m.update(message.encode(encoding='utf-8'))
        return m.hexdigest()
    
    def check():
        for i in str2:
            for j in str2:
                for k in str2:
                    nums2[0] = i
                    nums2[1] = j
                    nums2[2] = k
                    nums4 = nums1 + nums2 + nums3
                    if computeMD5(''.join('%s' %id for id in nums4)) == str:
                        print( ''.join(nums4) )
                        return
    
    check()
    

    java:
    t.charAt(i)是提取t中第i个位置的字符

    public static void main(String[] args) {
            String t = "0123456789abcdefghijklmnopqrstuvwxyz";
            String flagA  = "27a3c22d01eb";
            String flagB = "6ee8866aa5e5e7820";
            for (int i = 0; i < t.length(); i++) {
                char x = t.charAt(i);
                for (int j = 0; j < t.length(); j++) {
                    char y = t.charAt(j);
                    for (int k = 0; k < t.length(); k++) {
                        char z = t.charAt(k);
                        String flag = flagA + x + y + z + flagB;
                        if ("271373f323d9f76dc31204ff19823fdf".equals(MD5Utils.stringToMD5(flag))){
                            System.out.println("flag: "+flag);
                        }
                    }
                }
            }
    }
    

    做法二

    直接把271373f323d9f76dc31204ff19823fdf进行md5解密,得到wgwl$5000!

    然后再将wgwl$5000! md5加密得到27a3c22d01eb0466ee8866aa5e5e7820
    这里强推网站https://www.somd5.com/
    可以自动解两层md5

    Reverse02

    做法一

    一个exe,看一下界面

    到md5都是可读的,需要的就是后面的部分
    查壳

    查找字符串

    发现两个函数
    这里是表明在文本框中输入什么才会弹出flag提示框

      int v1; // edx
      int v2; // esi
      int result; // eax
    
      if ( ((unsigned __int8)a13 ^ 7) == *this
        && ((unsigned __int8)a12 ^ 7) == this[1]
        && ((unsigned __int8)a11 ^ 7) == this[2]
        && ((unsigned __int8)a10 ^ 7) == this[3]
        && ((unsigned __int8)a9 ^ 7) == this[4]
        && ((unsigned __int8)a8 ^ 7) == this[5]
        && ((unsigned __int8)a7 ^ 7) == this[6] )
      {
        v1 = dword_403380 + 2;
        v2 = dword_403018 - 1;
        dword_403380 += 2;
        --dword_403018;
      }
      else
      {
        v1 = dword_403380;
        v2 = dword_403018;
      }
      if ( ((unsigned __int8)a6 ^ 0x33) == this[7]
        && ((unsigned __int8)a5 ^ 0x33) == this[8]
        && ((unsigned __int8)a4 ^ 0x33) == this[9]
        && ((unsigned __int8)a3 ^ 0x33) == this[10]
        && ((unsigned __int8)a2 ^ 0x33) == this[11]
        && ((unsigned __int8)a1 ^ 0x33) == this[12] )
      {
        --v1;
        v2 += 2;
        dword_403380 = v1;
        dword_403018 = v2;
      }
      if ( v2 + v1 == 3 )
        result = sub_401000();
      else
        result = MessageBoxA(0, "flag:{NSCTF_md57e0cad17016b0>?45?f7c>0>4a>1c3a0}", "Flag", 0);
      dword_403018 = 1;
      dword_403380 = 0;
      return result;
    }
    

    这里是flag加密原理

    int sub_401000()
    {
      char *i; // eax
      char Destination; // [esp+0h] [ebp-38h] BYREF
      char v3[51]; // [esp+1h] [ebp-37h] BYREF
    
      Destination = 0;
      memset(v3, 0, 0x30u);
      strncpy_s(&Destination, 0x31u, "flag:{NSCTF_md57e0cad17016b0>?45?f7c>0>4a>1c3a0}", 0x30u);
      for ( i = &v3[14]; *i != 125; ++i )
        *i ^= 7u;
      return MessageBoxA(0, &Destination, "Flag", 0);
    

    实际上按照这个^7就可以了

    #include <stdio.h>
    main(){
    	char a[33] = "7e0cad17016b0>?45?f7c>0>4a>1c3a0";
    	int i;
    	for (i=0;i<32;i++){
    		printf("%c",a[i] ^ 7);
    	}
    }
    

    得到0b7dfc60761e798328a0d9793f96d4f7
    可以获取输入验证一下

    #include <stdio.h>
    main(){
    	char a[] ={0x4A, 0x50, 0x46, 0x6A, 0x58, 0x6A, 0x32, 0x3B, 0x39, 0x47, 0x57, 0x62, 0x4E};
    	int i;
    	for (i=12;i>=6;i--){
    		printf("%c",a[i] ^ 7);
    	}
    	for (i=5;i>=0;i--){
    		printf("%c",a[i] ^ 0x33);
    	}
    }
    

    得到输入为IeP@><5YkYucy

    做法二

    摁下按钮,flag弹框出现,可以选择用破解,将输入判定nop掉
    od打开,先查字符串,两个flag{

    区分一下
    第一个下面先调用了strncpy,后调用了message,所以是输出正确flag的函数

    第二个只调用了message,是检验输入的函数

    这里只要把调用第一个函数的判断条件nop掉,即可直接输出
    直接运行

    re

    主函数为

    有两个key
    key1

    dwfsxe *__fastcall key1(dwfsxe *this)
    {
      int i; // [rsp+14h] [rbp-2Ch]
      unsigned __int64 v3; // [rsp+18h] [rbp-28h] BYREF
      const char *v4; // [rsp+20h] [rbp-20h]
      size_t size; // [rsp+28h] [rbp-18h]
      char *v6; // [rsp+30h] [rbp-10h]
      unsigned __int64 v7; // [rsp+38h] [rbp-8h]
    
      v7 = __readfsqword(0x28u);
      v4 = "OFG{OxS3Lha6MUDk[0PnXofmcUrp`E3w`1@zalL2fZX1gJn4SWHFPGTEP2jHQivOVW7RWDDQW3PTTnf[UTmjSAOiHT6oIkerZ{q?";
      size = 192LL;
      v6 = (char *)malloc(0xC0uLL);
      for ( i = 0; i < size; ++i )
        v6[i] = v4[i] ^ 2;
      *(_QWORD *)this = ohfewfynewnfew(v6, size, &v3);
      return (dwfsxe *)(__readfsqword(0x28u) ^ v7);
    

    key1解出来后base64解密为0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ!@#$%^&*()_+
    key2

    handvfiu *__fastcall key2(handvfiu *this)
    {
      int i; // [rsp+14h] [rbp-2Ch]
      unsigned __int64 v3; // [rsp+18h] [rbp-28h] BYREF
      const char *v4; // [rsp+20h] [rbp-20h]
      size_t size; // [rsp+28h] [rbp-18h]
      char *v6; // [rsp+30h] [rbp-10h]
      unsigned __int64 v7; // [rsp+38h] [rbp-8h]
    
      v7 = __readfsqword(0x28u);
      v4 = "bEBn`GBkMV{fJyMLTF{yR@sQVjUNIoULJVtsN@UQ[d>>";
      size = 44LL;
      v6 = (char *)malloc(0x2CuLL);
      for ( i = 0; i < size; ++i )
        v6[i] = v4[i] ^ 3;
      *(_QWORD *)this = ohfewfynewnfew(v6, size, &v3);
      return (handvfiu *)(__readfsqword(0x28u) ^ v7);
    }
    

    key2解出来是hP&p0!5L#3NXLs@*QR%L&UN!L)0%Q
    check函数

    __int64 __fastcall check(B *this, dwfsxe *a2, handvfiu *a3)
    {
      int i; // [rsp+2Ch] [rbp-14h]
    
      if ( strlen(*(const char **)this) != 31 )
        wrong(this);
      for ( i = 0; i < strlen(*(const char **)this); ++i )
      {
        if ( *(_BYTE *)(*(_QWORD *)a2 + *(char *)(*(_QWORD *)this + i) - 48LL) != *(_BYTE *)(*(_QWORD *)a3 + i) )
          closeto(this);
      }
      return right(this);
    }
    

    check函数表明flag31位且a2[this[i] - 48 ] == a3[i],其中this是我们输入的部分
    写出脚本

    a2 = "0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ!@#$%^&*()_+"
    a3 = "hP&p0!5L^#3NXLs@*QR%L&UN!L)0%Q^"
    
    
    for i in range(len(a3)):           #一共循环31次
        for j in range(len(a2)):
            if a3[i] == a2[j]:
                print(chr(j + 48),end="")
    

    flag为ActI0n5_sp3ak_Louder_than_w0rds

    参考链接

    NSCTF练习平台逆向题WP

    你做的每件事都值得。 ——yaerda
  • 相关阅读:
    一种查找中值的方法——Rank_Select
    VS 2008 下安装OpenCV 2.3.0 .【转载】
    【转】OpenCV HOGDescriptor 参数图解 .
    VLFeat——SIFT图像特征提取(VC++实现)【转载】
    KD Tree
    【转】让任务管理器画出正弦曲线
    VLFeatmean sift开源库【配置】【转载】
    《程序员求职成功路》之字符串__strtok函数相关理解【转载】
    堆排序
    opencv imread
  • 原文地址:https://www.cnblogs.com/XXX-Echoed/p/15083065.html
Copyright © 2020-2023  润新知