[watevrCTF 2019]Timeout.zip

ida 分析。

发现 main 函数啥都没有

然后 看看 其他函数,

发现 里面 有 一个 字符串显示 ,现实的 就是 wateverctf{} 的字符串。

说明这里就是 flag。

dump 下来

l = [0x23,0x3c,0x49,100,0x55,0x2e,0x77,0x20,0x2d,0x73,0x3f,0x7d,0x2c,0x38,0x6c,0x53,0x54,0x2a,0x5a,0x6a,0x57,0x3a,0x66,0x5e,0x4d,0x36,0x65,0x6e,0x70,0x68,99,0x2f,0x4f,0x76,0x25,0x4b,0xb,0x34,0x4c,0x52,0x67,0x60,0x5f,0x45,0x7b,0x72,0x3b,0x7e,0x4a,10,0x6b,0x71,0x43,0x24,0x5c,0x28,0x22,0x40,0x32,0x44,0x62,0x50,0xd,0x26,0x31,0x37,0xc,0x5d,0x79,0x3e,0x3d,0x78,0x61,0x56,0x59,0x41,0x5b,0x42,0x46,0x33,0xb4,0x21,0x74,0x51,0x48,0x75,0x30,0x58,0x69,0x35,0x7c,9,0x39,0x4e,0x2b,0x7a,0x6d,0x47,0x29,0x6f,0,0x77,0x61,0x74,0x65,0x76,0x72,0x7b,0x33,0x6e,99,0x72,0x79,0x74,0x69,0x6f,0x6e,0x5f,0x69,0x73,0x5f,0x6f,0x76,0x65,0x72,0x72,0x61,0x74,0x65,100,0x5f,0x79,0x6f,0x75,0x74,0x75,0x62,0x65,0x2e,99,0x6f,0x6d,0x2f,0x77,0x61,0x74,99,0x68,0x3f,0x76,0x3d,0x4f,0x50,0x66,0x30,0x59,0x62,0x58,0x71,0x44,0x6d,0x30,0x7d,0]

print(''.join(chr(x) for x in l))

# watevr{3ncrytion_is_overrated_youtube.com/watch?v=OPf0YbXqDm0}