from Crypto.Cipher import Blowfish
from Crypto.Util.number import bytes_to_long
key=b"\x00\x0F\x1A\x01\x35\x3A\x3B\x20"
plaintext="ddddwwwaaawwwddd"
blowfish=Blowfish.new(key,Blowfish.MODE_ECB)print(hex(bytes_to_long(blowfish.encrypt(plaintext))).replace('0x','').replace('L',''))#db824ef8605c5235b4bbacfa2ff8e087
驗證成功
[b01lers2020]little_engine
elf文件,無殼,ida分析 main函數,sub_55B25B5476B0函數,程序打印“Are you ready?”后,輸入一個ASCII碼小于127的字符 sub_55B25B547830函數,程序打印“Give me your best tidbit:”后,輸入flag sub_55B25B547510函數對輸入進行異或運算,規律可循 sub_55B25B5475A0函數將變換后的輸入與已知比較,驗證輸入
unk_55B25B548220=[0xE1,0xE6,0xD0,0x4A,0xF2,0xC3,0x7E,0xAA,0xE6,0xFC,0x42,0xB2,0xF2,0xB5,0x01,0xB4,0xEC,0x7D,0x39,0x20,0xEF,0xC0,0x4E,0x13,0xC8,0x2F,0x67,0xAA,0x95,0x79,0x6B,0xF5,0xF2,0x06,0x41,0x79,0xD8,0x35,0xF9,0xC8,0x8E,0xDE,0x88,0x51,0xAC,0x4C,0xF0,0x81,0xE0,0xF4,0xEE,0x14,0xAD,0xF1,0x25,0xBD,0x82,0x7C,0x62,0x30,0xA5,0xF8,0x80,0x2B,0x79,0x85,0x2A,0xF8,0x6E,0x5A,0xAE,0xCB,0x18,0x3A,0xA2,0xD0,0x09,0xC5,0x8C,0x5D,0x3D,0x34,0x6B,0xF9,0x3B,0x72,0x4B,0x0E,0x4A,0xC3,0x71,0x53,0xE1,0xE9,0x07,0xBB,0xC1,0x1A,0xE7,0x07,0x8F,0x1B,0x75,0x74,0xB9,0x8E,0x5D,0x2E,0xC2,0xF6,0x17,0x3B,0x52,0xED,0xD7,0xBD,0x5E,0xE9,0x76,0x63,0x72,0xE2,0xEA,0x89,0x51,0xD7,0x4F,0x34,0xDC,0x39,0xD5,0x58,0x92,0xD9,0xD2,0xD2,0xAA,0x69,0xF1,0xBF,0x90,0x76,0xE1,0x9C,0x39,0x0D,0x0C,0xB3,0x40,0x06,0x48,0xDA,0x27,0xD5,0x1E,0xB8,0x4A,0x94,0x4C,0x98,0xC4,0x8A,0x68,0xA8,0x97,0x5E,0x64,0xF9,0xC0,0x58,0xF7,0x02,0x72,0x8D,0x3B,0x88,0x18,0x14,0xEC,0x8F,0x42,0x70,0x0C,0x0B,0x96,0x66,0x22,0x8E,0xF7,0x58,0x01,0x2E,0xC5,0xDC,0x4B,0xC0,0x71,0xF4,0xDA,0xE6,0x3D,0x73,0x88,0x7D,0xE4,0x91,0x1F,0x75,0x90,0x70,0xD6,0x0C,0xA7,0x09,0x7C,0xF2,0x5A,0x4E,0xA1,0x09,0x0C,0x51,0x3C,0xBA,0xA8,0x64,0x38,0x2D,0x8C,0x00,0x88,0xE3,0x6F,0xEA,0x77,0x90,0x74,0x39,0xAA,0x56,0xF1,0xA8,0x6E,0x80,0xCA,0x3D,0x9E,0x69,0xA4,0x69,0x48,0xF2,0x0A,0x2C,0xF7,0x33,0x17,0x0F,0x5C,0xF2,0x8A,0xE5,0x2F,0x55,0xA5,0x9F,0x8B,0x65,0x54,0x76,0xE0,0x64,0xEE,0x9D,0x9B,0x2D,0x9B,0x5F,0x72,0x7F,0x3B,0xD9,0xDF,0x05,0x69,0xF0,0x9F,0xF0,0xA3,0x8C,0xE6,0xCD,0xEF,0xB4,0xBC,0x44,0x54,0x3E,0xE3,0x44]
init=0x91
flag=[]for i inrange(0,len(unk_55B25B548220),4):# step : 4flag.append(unk_55B25B548220[i]^init)init=(init+i//4)%0xffprint(''.join(chr(i)for i in flag))# pctf{th3_m0d3rn_st34m_3ng1n3_w45_1nv3nt3d_1n_1698_buT_th3_b3st_0n3_in_1940}
from Crypto.Util.number import long_to_bytes
res=[2351698746,4148999158,4276070130,2871606843,651135530,2292314745]for i inrange(len(res)-1,0,-1):res[i]^=res[i-1]
xmmword_405034=[3,16,13,4,19,11]for i inrange(len(res)):res[i]^=(1<<xmmword_405034[i])res[i]=(((~(res[i]&0xffff))<<16)&0xffff0000)|(((res[i]&0xffff0000)>>16)&0x0000ffff)res[i]=((res[i]<<xmmword_405034[i])|(res[i]>>(32-xmmword_405034[i])))&0xffffffffprint(''.join(long_to_bytes(i)for i in res))# flag{a_3a2y_re_for_test}創作挑戰賽新人創作獎勵來咯,堅持創作打卡瓜分現金大獎