re | [NPUCTF2020]BasicASM 这个题很神奇,给了一个.s文件和一个txt文件。 打开一看,txt文件是输出,.s文件是汇编代码,x86-64的汇编,完全不难,大概看看就知道干了些啥了,这里贴出分析: 100007FF7A8AC5A50pushrbp200007FF7A8AC5A52pushrdi300007FF7A8AC5A53subrsp,238h400007FF7A8AC5A5Alearbp,[rsp+20h]500...
小白学习笔记(0) CG-CTF-re-3 py交易 小白学习笔记(1) BUUCTF-re xor 小白学习笔记(2)BUUCTF-re-新年快乐 __EOF__ 本文作者:Palmer 本文链接:https://www.cnblogs.com/palmer0801/p/12111826.html关于博主:评论和私信会在第一时间回复。或者直接私信我。版权声明:本博客所有文章除特别声明外,均采用 BY...
intmain(intargc,charconst*argv[]){charinput[]={0x0,0x67,0x6e,0x62,0x63,0x7e,0x74,0x62,0x69,0x6d,0x55,0x6a,0x7f,0x60,0x51,0x66,0x63,0x4e,0x66,0x7b,0x71,0x4a,0x74,0x76,0x6b,0x70,0x79,0x66,0x1c};func(input,28);printf("%s\n",input+1);return0;} 发现主要功能还是...
https://github.com/riscv/riscv-gnu-toolchain 或者用下面这个idaproc可以打开,但是效果不太好。 https://github.com/bingseclab/ida_riscv 总之就是装第一个工具然后objdump能够查看反汇编(这里参考了官方wp),exp如下: data = [0x11,0x76,0xd0,0x1e,0x99,0xb6,0x2c,0x91,0x12,0x45,0xfb,0x2a,0x...