0%

simple-unpack

题目描述:菜鸡拿到了一个被加壳的二进制文件

提示有壳,查壳

image-20200708115818743

64位文件,upx加壳

还原压缩upx -d 程序名.exe

image-20200708120921416

github上upx下载链接

https://github.com/upx/upx/releases

kali中也自带upx

image-20200708121537942

upx学习链接:https://blog.csdn.net/The_whale_demon/article/details/104111320

拖入IDA中分析,mian函数中的flag变量中保存了flag

image-20200708120720249

image-20200708120747317

alt+t搜索flag也能搜索到

image-20200708121326222