Hexo

Home Archives
2026-03-15
逆向

crackme-crackit

CrackIt;)

https://crackmes.one/crackme/69a65ee60f5b9757a6a5f73f

1. 下载解压

zip解压密码:crackmes.one

2. IDA free

  • 先看字符串
    字符串中没有直接给出

  • 再看结构

3. GDB

1
2
3
4
5
# 先越过字符串长度的限制,判断了0x28=40个字符

# 找到关键指令
# b *0x55555555547b
call _memcmp

5. 验证结果

1
./crackit "CTF{My_S3cr3t_Fl4g}W0WY0uF0undM3{0r N0t}"
Share
  • 逆向
Newer
crackme编码保存字符串
Older
ELF文件解析

Categories

  • AI
  • c/c++
  • docker
  • git
  • i386
  • linux
  • mac
  • network
  • web前端
  • 逆向

Tags

  • c/c++
  • css布局
  • linux
  • python2, python3
  • syscall
  • unix
  • 协议
  • 浏览器
  • 逆向

Tag Cloud

c/c++ css布局 linux python2, python3 syscall unix 协议 浏览器 逆向

Archives

  • March 2026
  • February 2026
  • January 2026
  • May 2025
  • April 2025
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • April 2022
  • May 2021
  • April 2021
  • December 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • June 2019
  • March 2019
  • November 2018
  • October 2018
  • September 2018
  • July 2018
  • May 2018

Recent Posts

  • crackme-Date of Birth
  • crackme编码保存字符串
  • crackme-crackit
  • ELF文件解析
  • 动态链接
© 2026 John Doe
Powered by Hexo
Home Archives