Papa brought me a packed present! let's open it.

Download : http://pwnable.kr/bin/flag

This is reversing task. all you need is binary

 

丢进winhex里分析

pwnable flag之write up

是elf文件,那么分析一下elf文件:

pwnable flag之write up

 可猜到可能是upx加壳:用strings flag得到:

pwnable flag之write up

可知是加壳

或者:

pwnable flag之write up

可确定是upx加壳,于是脱壳后放入ida用Shift+F12便可获取flag

pwnable flag之write up

此处有多种方法,也可放进winhex里得到,或通过gdb查找地址得到。

 

相关文章: