我可是会飞的啊 主要方向:re,pwn

[Pico CTF 2021]pwn-Stonks

题目分析 pwn题目的一种形式是,直接给源码,本题就是: #include <stdlib.h> #include <stdio.h> #include <string.h> #include <time.h> #define FLAG_BUFFER 128 #define MAX_SYM_LEN

selph Published on 2023-11-02

[Google CTF 2023]rev-zermatt

‍ 分析 这里给了个超长的lua脚本,格式化之后,首先看到的就是一个解密函数: local v0 = string.char; local v1 = string.byte; local v2 = string.sub; local v3 = bit32 or bit

selph Published on 2023-10-31

[Google CTF 2023]pwn-write-flag-where3

题目分析 int __cdecl main(int argumentCount, const char **arguments, const char **environmentVariables) { __int64 buffer[9]; // [rsp+0h] [rbp-70h] BYREF

selph Published on 2023-10-26

[Google CTF 2023]pwn-write-flag-where2

题目分析 直接看代码: int __cdecl main(int argumentCount, const char **arguments, const char **environmentVariables) { __int64 buffer[9]; // [rsp+0h] [rbp-70h

selph Published on 2023-10-25

[Google CTF 2023]pwn-write-flag-where1

文件信息: [*] '/home/selph/CTF-Exercise/Google CTF 2023/write-flag-where/chal' Arch: amd64-64-little RELRO: Partial RELRO Stack: No

selph Published on 2023-10-23

2023 SunShine CTF Writeup(1re, 2pwn)

2023 SunShine CTF Writeup(1re, 2pwn) 共解出:1crypto, 1scripting, 1re, 2pwn 剩下几个pwn看了,没思路,有wp了学习了再更新分享 Crypto-BeepBoop Cryptography 题目文件: beep beep beep b

selph Published on 2023-10-10

从一道Re题学习12种反调试反虚拟技术

从一道Re题学习12种反调试反虚拟技术

selph Published on 2022-12-19
selph Published on 2022-11-30

HITCON CTF 2022 Writeup Re-meow way

也是很意思的一道题,这里通过ret far指令在32位程序中途切换执行64位代码,这操作很厉害

selph Published on 2022-11-28

HITCON CTF 2022 Writeup Re-checker

挺有意思的一道题,这里的关键函数是使用的动态生成执行操作,按照特定参数序列进行解密才能正常执行,否则一定会报错异常

selph Published on 2022-11-28
Previous Next