
IPromise


附件拖入ida

main里没东西,但是函数列表很明显。直接在线网站解


Taylor's First Swift


附件拖入ida,会提示识别到结构,选择yes



比较简单,可以直接猜异或之后再base64

What's in the Box?


新遇见的题型,是用makeself打包的文件。github上试试能不能搜到

直接试一试,得到解压后的文件


比较简单,直接跑一下

A Locked Box


尝试直接解压不行,提示说大小不对

看了看上个题的大小


刚好是在res后的数据大小。改成正确的文件大小

继续尝试,又提示说checksum不一样,仔细对比,发现就少了前两位,给它补上


然后就可以了(实际上也可以直接运行,不用这么麻烦。。)

Guitar


附件拖入jadx

mainactivity里面没东西,布局文件里也没东西

但是strings里面有个secret

赛博厨子嗦一下

Kitty Kitty Bang Bang


附近拖入jadx

字符串来自native层函数,下断点动调

Buggy Jumper 1


附件拖入jadx

godot引擎写的安卓游戏,这还是第一次遇到。到处找找看呗

assets里的脚本目录下有个flag.gdc。看了看工具,刚好能反编译

直接反编译即得

Buggy Jumper 2


与上一题一样,把所有能反编译的都反编译,然后文本编辑器打开


能够发现进行了网络请求。每次启动会请求register和save,每次点击购买会请求verify。register最主要是获取一个auth_token,每次都不一样,save和verify都要用到这个token。save一开始没仔细看,以为只是记录一下token。verify则是判断是否合法,合法则返回flag。仔细看save就能发现它是在请求体body里把分数上传了,verify时如果不等于那就会提示作弊。所以直接先修改重发一遍save,再修改重发一遍verify即可

