2024BaseCTF-re

WTT0011發表於2024-11-17

BaseCTF-re

You are good at IDA

直接按F5得到一地段flag

2024BaseCTF-re

Y0u_4Re_

第二段提示F12

2024BaseCTF-re

雙擊開啟

2024BaseCTF-re

按x

2024BaseCTF-re

900d_47_

最後一段提示在Interesting函式之中

2024BaseCTF-re

id4

BaseCTF{Y0u_4Re_900d_47_id4}

UPX mini

先脫殼

2024BaseCTF-re

拖入IDA,base64解碼就好

2024BaseCTF-re

BasePlus

F5

2024BaseCTF-re

找到key0xE

2024BaseCTF-re

2024BaseCTF-re

base64換表+異或

BaseCTF{BA5e_DEcoD1N6_sEcr3t}

UPX

脫殼不了

2024BaseCTF-re

小寫的upx改大寫

2024BaseCTF-re

2024BaseCTF-re

2024BaseCTF-re

2024BaseCTF-re

base64換表

用官方的指令碼跑一下吧...

import base64
import string
enc = "$rg7_dhd~Alidg+zeyhz`vnz_d,7sy0="
string1 = 'A,.1fgvw#`/2ehux$~"3dity%_;4cjsz^+{5bkrA&=}6alqB*-[70mpC()]89noX'
string2 = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/"
print (base64.b64decode(enc.translate(str.maketrans(string1,string2))))

BaseCTF{UPX_1s_$o_e@sy}