[name=FlyDragon] Step.1 觀察 output.txt 以及執行程式碼 可猜測 flag.exe 會將flag打亂後輸出 Step.2 使用ghidra查看 main() 可以發現這個程式會讀入flag.txt、照特定的順序交換後輸出
11/1/2023LoTuX CTF Writeup Dark Theme Design By Curious
10/2/2023[name=Curious] Train of Thought & Solution Continuing from the previous question's Writeup, after downloading app.py, you can find the following piece of code: @app.get('/1d538e83d6f6b08f') def secret(): try: with open('/proc/sys/kernel/random/boot_id') as f: hint = f.readline().strip()
9/25/2023[name=Curious] 思路 承接上一題的 Writeup,在下載 app.py 之後可以看到這樣一段程式碼 @app.get('/1d538e83d6f6b08f') def secret(): try: with open('/proc/sys/kernel/random/boot_id') as f: hint = f.readline().strip()
9/25/2023or
By clicking below, you agree to our terms of service.
New to HackMD? Sign up