攻防世界 reverse 新手练习区
1.re1 DUTCTF IDA shift+F12 查看字符串 DUTCTF{We1c0met0DUTCTF} 2.game ZSCTF zsctf{T9is_tOpic_1s_v5ry_int7resting_b6t_others_are_n0t} 3.Hello, CTF Pediy CTF 2018 CrackMeJustForFun 将16进制字符串转ascii字符串得到flag 4.open-source HackYou CTF 参数 51966 25 h4cky0u flag为: c0ffee 5.open-source 9447 CTF 2014 IDA查看字符串 9447{This_is_a_flag} 6.simple-unpack 脱壳搜索字符串 flag{Upx_1s_n0t_a_d3liv3r_c0mp4ny} 7.logmein RC3 CTF 2016 1 v8= " :\"AL_RT^L*.?+6/46 " 2 v7 = ' ebmarah ' [::-1 ] 3 s= '' 4 for i in range(len(v8)): 5 s+=chr(ord(v7[i%7])^ ord(v8[i])) 6 7 print (s) RC3-2016-XORISGUD 8. no-strings-attached 9447 CTF 2014 1