2024CtfNewStar Week2 Re&Web-wp
Reverse(✿・ω・)/原题 drink_tea查壳后丢进ida,在main函数中发现加密函数,密钥和加密后的密文。分析加密函数,发现tea加密的特征deltea值,于是把密钥的值按d变为dd形式的数据,拿到4个密钥,然后提取出密文写脚本解密,把加密过程反过来就行。脚本如下。 123456789101112131415161718192021222324252627282930313233343536373839404142434445#include <stdio.h>int __fastcall dec(unsigned int* input, unsigned int* key_1);int main() { unsigned char m[32] = { 0x78, 0x20, 0xF7, 0xB3, 0xC5, 0x42, 0xCE, 0xDA, 0x85, 0x59, 0x21, 0x1A, 0x26, 0x56, 0x5A, 0x59, 0x29, 0x02, 0x0D,...