【湾区杯2025】Hardtest

Neuro 2025-10-31 17:42:21 127 0 返回题目详情


【湾区杯2025】Hardtest

本平台连接:[hardtest - Bugku CTF平台]

|> 这个题目拖进IDA里面发现整体很干净,没有混淆或者奇怪的加壳与花指令,可以尝试对伪代码进行算法还原

|>整体的分析转化为C语言差不多就这样(将就着看吧,反正不能运行)

>下面是伪代码,尝试直接进行分析

#include <bits/stdc++>
// Sbox查表 - 屯数据
char s_box[256] = {
    0x63, 0x7C, 0x77, 0x7B,叽里咕噜那一堆....
};
// 加密后的flag
char encrypted_flag[24] = {
    -105, -43, 96, 67, -76, 16, 67, 115, 15, -38, 67, -51, -45, -24, 115, 74, 
    -108, -61, -51, 113, -67, -36, -105, 26
};
// 循环左移函数
char rotate_left(char value, int shift) {
    return (value << shift) | (value >> (8 - shift));
}
// 循环右移函数
char rotate_right(char value, int shift) {
    return (value >> shift) | (value << (8 - shift));
}
// 在GF(257)有限域中计算模逆元
char modular_inverse(char a) {
    if (a == 0) return 0;
    short result = 1;
    short exponent = 255;
    short base = a;
    // 使用快速幂算法计算模逆(出题人还会算法哦)
    while (exponent) {
        if (exponent & 1) {
            result = (result * base) % 257;
        }
        base = (base * base) % 257;
        exponent >>= 1;
    }
    return (char)result;
}
// 主要字符变换函数
char transform_character(char input_char) {
    // 第一步:与0x5A异或后循环左移3位
    char step1 = rotate_left(input_char ^ 0x5A, 3);
    // 第二步:分离高4位和低4位
    char high_bits = (step1 >> 4) & 0xF;  // 高4位
    char low_bits = step1 & 0xF;          // 低4位
    // 第三步:在GF(16)上进行仿射变换
    char transformed_high = (3 * high_bits) & 0xF;  // 高4位乘以3
    char transformed_low = (5 * low_bits) & 0xF;    // 低4位乘以5
    // 第四步:重新组合高低位
    char combined = (transformed_high << 4) | transformed_low;
    // 第五步:在GF(257)上求模逆
    char inverse = modular_inverse(combined);
    // 第六步:使用S盒替换并循环右移2位
    return s_box[rotate_right(inverse, 2)];
}
// 预处理输入字符串
void preprocess_input(const char* input, char* output) {
    int length = strlen(input);
    for (int i = 0; i < length; ++i) {
        // 对每个字符进行循环左移,移位量由位置决定
        output[i] = rotate_left(input[i], (i % 7) + 1);
    }
}
int main() {
    char random_number = rand() % 255 + 1;
    printf("input your number(1-255): ");
    int user_input;
    if (random_number == user_input) {
        //碰运气哦
        while (getchar() != '\n');
        printf("flag: ");
        char user_flag[100];
        fgets(user_flag, sizeof(user_flag), stdin);
        // 移除换行符
        user_flag[strcspn(user_flag, "\n")] = 0;
        int flag_length = strlen(user_flag);
        // 预处理输入
        char* preprocessed_flag = (char*)malloc(flag_length + 1);
        preprocess_input(user_flag, preprocessed_flag);
        // 对每个字符进行变换
        char* transformed_flag = (char*)malloc(flag_length + 1);
        for (int i = 0; i < flag_length; ++i) {
            transformed_flag[i] = transform_character(preprocessed_flag[i]);
        }
        // 与目标flag比较
        int is_correct = 1;
        for (int i = 0; i < flag_length; ++i) {
            if (transformed_flag[i] != encrypted_flag[i]) {
                is_correct = 0;
                break;
            }
        }
        (is_correct) ? printf("right\n"):printf("error\n");
}

然后整体的加密与解密流程>>

>>>加密:
原始字符 → 预处理 → 异或0x5A → 循环左移3 → 分离高低位 → GF(16)乘法 → 组合 → GF(257)模逆 → S盒 → 循环右移2 → 密文

>>>逆向解密:密文 → 循环左移2 → 逆S盒 → GF(257)模逆 → 分离高低位 → GF(16)逆乘法 → 组合 → 循环右移3 → 异或0x5A → 逆向预处理 → 原始字符
由此可以写出简单的解密脚本喵~ >>
byte_2020 = [
    99, 124, 119, 123, 242, 107, 111, 197, 48, 1, 103, 43, 254, 215, 171, 118,
    202, 130, 201, 125, 250, 89, 71, 240, 173, 212, 162, 175, 156, 164, 114, 192,
    183, 253, 147, 38, 54, 63, 247, 204, 52, 165, 229, 241, 113, 216, 49, 21,
    4, 199, 35, 195, 24, 150, 5, 154, 7, 18, 128, 226, 235, 39, 178, 117,
    9, 131, 44, 26, 27, 110, 90, 160, 82, 59, 214, 179, 41, 227, 47, 132,
    83, 209, 0, 237, 32, 252, 177, 91, 106, 203, 190, 57, 74, 76, 88, 207,
    208, 239, 170, 251, 67, 77, 51, 133, 69, 249, 2, 127, 80, 60, 159, 168,
    81, 163, 64, 143, 146, 157, 56, 245, 188, 182, 218, 33, 16, 255, 243, 210,
    205, 12, 19, 236, 95, 151, 68, 23, 196, 167, 126, 61, 100, 93, 25, 115,
    96, 129, 79, 220, 34, 42, 144, 136, 70, 238, 184, 20, 222, 94, 11, 219,
    224, 50, 58, 10, 73, 6, 36, 92, 194, 211, 172, 98, 145, 149, 228, 121,
    231, 200, 55, 109, 141, 213, 78, 169, 108, 86, 244, 234, 101, 122, 174, 8,
    186, 120, 37, 46, 28, 166, 180, 198, 232, 221, 116, 31, 75, 189, 139, 138,
    112, 62, 181, 102, 72, 3, 246, 14, 97, 53, 87, 185, 134, 193, 29, 158,
    225, 248, 152, 17, 105, 217, 142, 148, 155, 30, 135, 233, 206, 85, 40, 223,
    140, 161, 137, 13, 191, 230, 66, 104, 65, 153, 45, 15, 176, 84, 187, 22
]

target = [b & 0xFF for b in [
    -105, -43, 96, 67, -76, 16, 67, 115, 15, -38, 67, -51, -45, -24, 115, 74,
    -108, -61, -51, 113, -67, -36, -105, 26
]]
# 计算逆元
def mod_inv(a, m=257):
    for i in range(1, m):
        if (a * i) % m == 1:
            return i
    return 0
#循环左移
def leftroll(x, s):
    return ((x << s) | (x >> (8 - s))) & 0xFF
#循环右移
def rightroll(x, s):
    return ((x >> s) | (x << (8 - s))) & 0xFF
#sbox逆向
def sbox(val):
    idx = byte_2020.index(val)
    v3 = leftroll(idx, 2)
    inv_v3 = mod_inv(v3)
    if inv_v3 == 0:
        return 0
    for v1 in range(256):
        high = (3 * (v1 >> 4)) & 0xF
        low = (5 * (v1 & 0xF)) & 0xF
        test = (16 * high) | low
        if test == inv_v3:
            return rightroll(v1, 3) ^ 0x5A
    return 0
flag = []
for i, b in enumerate(target):
    orig = sbox(b)
    shift = (i % 7) + 1
    flag.append(chr(rightroll(orig, shift)))
print(''.join(flag))
然后运行获得flag >>
flag{Bl@st1ng_1s_a_g00d_Way!!}
分类:Reverse
image
作者:Neuro

3

提交

0

收入

相关WriteUP

  • 2018网鼎杯3-babyre

    ***收费WriteUP请购买后查看,VIP用户可免费查看***

    • Reverse
    • 4年前
  • EasyXor

    ***收费WriteUP请购买后查看,VIP用户可免费查看***

    • Reverse
    • 2年前
  • EasyReverse

    ***收费WriteUP请购买后查看,VIP用户可免费查看***

    • Reverse
    • 2年前
  • [NUAACTF-2017] [Reverse]robots解法

    ***收费WriteUP请购买后查看,VIP用户可免费查看***

    • Reverse
    • 2年前
  • 2018-网鼎杯-advance

    ***收费WriteUP请购买后查看,VIP用户可免费查看***

    • Reverse
    • 2年前
问题反馈