CTF

二进制分析实战第五章(4)

Posted by Kody Black on September 12, 2023

第五章 Linux二进制分析

第四题:分析lvl4文件

$ file lvl4 
lvl4: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=f8785d89a1f11e7b413c08c6176ad1ed7b95ca08, stripped
$ ltrace ./lvl4 
__libc_start_main(0x4004a0, 1, 0x7ffefb1f2b28, 0x400650 <unfinished ...>
setenv("FLAG", "656cf8aecb76113a4dece1688c61d0e7"..., 1)                                         = 0
+++ exited (status 0) +++

结果flag就是656cf8aecb76113a4dece1688c61d0e7,瞬间结束!

$ ./oracle 656cf8aecb76113a4dece1688c61d0e7
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~+
| Level 4 completed, unlocked lvl5         |
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~+
Run oracle with -h to show a hint