网站介绍:文章浏览阅读405次。附件是.exe文件,放入ExeInfoPE中,发现是linux可执行文件放入IDA64中,F5查看伪代码int __cdecl main(int argc, const char **argv, const char **envp){ char s[24]; // [rsp+0h] [rbp-20h] BYREF int v5; // [rsp+18h] [rbp-8h] int i; // [rsp+1Ch] [rbp-4h] for ( i = 0; i <= 181; _reverse babyre hello!\nplease enter the flag:
- 链接地址:https://blog.csdn.net/P_Bloomberg/article/details/119514675
- 链接标题:攻防世界-Reverse-BABYRE_reverse babyre hello!\nplease enter the flag:-CSDN博客
- 所属网站:blog.csdn.net
- 被收藏次数:7481
- 网站标签:reverse babyre hello!\nplease enter the flag: