re_Dizzy
- 反汇编出main函数,导出汇编文件(.asm)
- 利用正则表达式将所有加密功能的汇编代表转换为python语法表示
- 使用脚本计算flag
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20with open('./Dizzy.exe.asm') as f:
lines = f.readlines()
lines.reverse()
flag = [0x27 ,0x3C ,0x0E3,0x0FC,0x2E ,0x41 ,7,0x5E ,0x62 ,0x0CF,0x0E8,0x0F2,0x92,0x80,0x0E2,0x36 ,0x0B4,0x0B2,0x67 ,0x77 ,0x0F,0x0F6,0x0D,0x0B6,0x0ED,0x1C,0x65 ,0x8A,7,0x53 ,0x0A6,0x66]
for line in lines:
if '-' in line:
tmp = line.replace('-', '+')
exec(tmp)
continue
elif '+' in line:
tmp = line.replace('+', '-')
exec(tmp)
else:
exec(line)
for f in flag:
print(chr(f & 0xff), end='')
re_勒索解密
- 编译、运行以下C++程序
- 在生成的bmp文件中寻找0x424d开头的文件
- 打开图片
1 |
|