Reversing-x64Elf-100 Writeup

Analysis

拿到附件用file确定一下文件类型得知是64位ELF文件,用IDA分析:

mian函数伪代码如下:

__int64 __fastcall main(int a1, char **a2, char **a3)
{
  char s[264]; // [rsp+0h] [rbp-110h] BYREF
  unsigned __int64 v5; // [rsp+108h] [rbp-8h]

  v5 = __readfsqword(0x28u);
  printf("Enter the password: ");
  if ( !fgets(s, 255, stdin) )
    return 0;
  if ( (unsigned int)sub_4006FD(s) )
  {
    puts("Incorrect password!");
    return 1;
  }
  else
  {
    puts("Nice!");
    return 0;
  }
}

分析上述代码我们可以得知,程序首先定义了一个长度为264位的字符出s,初步分析认为是用于存储程序的输入,往下看大致得知该程序为校验密码,跳转到验证函数sub_4006FD

验证函数伪代码如下:

__int64 __fastcall sub_4006FD(__int64 a1)
{
  int i; // [rsp+14h] [rbp-24h]
  _QWORD v3[4]; // [rsp+18h] [rbp-20h]

  v3[0] = "Dufhbmf";
  v3[1] = "pG`imos";
  v3[2] = "ewUglpt";
  for ( i = 0; i <= 11; ++i )
  {
    if ( *(char *)(v3[i % 3] + 2 * (i / 3)) - *(char *)(i + a1) != 1 )
      return 1;
  }
  return 0;
}

Exploit

a=["Dufhbmf","pG`imos","ewUglpt"]
s=''
for i in range(12):
    s+=chr(ord(a[i % 3][2 * int(i / 3)])-1)
print(s)

Reversing-x64Elf-100 Writeup
https://zer0ptr.github.io/2025/08/26/adworld-reversing-x64Elf-100/
Author
zer0ptr
Posted on
August 26, 2025
Licensed under