<!DOCTYPE html>
<html lang="zh-CN">
<head>
  <meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=2">
<meta name="theme-color" content="#222">
<meta name="generator" content="Hexo 4.2.1">
  <link rel="apple-touch-icon" sizes="180x180" href="/file/apple-touch-icon.png">
  <link rel="icon" type="image/png" sizes="32x32" href="/file/favicon-32x32.png">
  <link rel="icon" type="image/png" sizes="16x16" href="/file/favicon-16x16.png">
  <link rel="mask-icon" href="/file/logo.svg" color="#222">

<link rel="stylesheet" href="/css/main.css">


<link rel="stylesheet" href="/lib/font-awesome/css/all.min.css">

<script id="hexo-configurations">
    var NexT = window.NexT || {};
    var CONFIG = {"hostname":"czlz.net","root":"/","scheme":"Pisces","version":"7.8.0","exturl":false,"sidebar":{"position":"right","display":"post","padding":18,"offset":12,"onmobile":false},"copycode":{"enable":false,"show_result":false,"style":null},"back2top":{"enable":true,"sidebar":false,"scrollpercent":false},"bookmark":{"enable":false,"color":"#222","save":"auto"},"fancybox":false,"mediumzoom":false,"lazyload":false,"pangu":false,"comments":{"style":"tabs","active":null,"storage":true,"lazyload":false,"nav":null},"algolia":{"hits":{"per_page":10},"labels":{"input_placeholder":"Search for Posts","hits_empty":"We didn't find any results for the search: ${query}","hits_stats":"${hits} results found in ${time} ms"}},"localsearch":{"enable":true,"trigger":"auto","top_n_per_article":1,"unescape":false,"preload":false},"motion":{"enable":true,"async":false,"transition":{"post_block":"fadeIn","post_header":"slideDownIn","post_body":"slideDownIn","coll_header":"slideLeftIn","sidebar":"slideUpIn"}},"path":"search.xml"};
  </script>

  <meta name="description" content="来自星星的练习题二">
<meta property="og:type" content="article">
<meta property="og:title" content="杂项二（大比武_CTF课_第十一天）">
<meta property="og:url" content="https://czlz.net/2020/jxsw_dbw_misc_2/index.html">
<meta property="og:site_name" content="粗制乱造的个人网站">
<meta property="og:description" content="来自星星的练习题二">
<meta property="og:locale" content="zh_CN">
<meta property="og:image" content="https://czlz.net/2020/jxsw_dbw_misc_2/keyxl_1.png">
<meta property="og:image" content="https://czlz.net/2020/jxsw_dbw_misc_2/llfx_1.png">
<meta property="og:image" content="https://czlz.net/2020/jxsw_dbw_misc_2/llfx_2.png">
<meta property="og:image" content="https://czlz.net/2020/jxsw_dbw_misc_2/llfx_3.png">
<meta property="og:image" content="https://czlz.net/2020/jxsw_dbw_misc_2/llfx2_1.png">
<meta property="og:image" content="https://czlz.net/2020/jxsw_dbw_misc_2/llfx2_2.png">
<meta property="og:image" content="https://czlz.net/2020/jxsw_dbw_misc_2/mwgj_1.png">
<meta property="og:image" content="https://czlz.net/2020/jxsw_dbw_misc_2/mwgj_2.png">
<meta property="og:image" content="https://czlz.net/2020/jxsw_dbw_misc_2/mwgj_3.png">
<meta property="og:image" content="https://czlz.net/2020/jxsw_dbw_misc_2/mwgj_4.png">
<meta property="og:image" content="https://czlz.net/2020/jxsw_dbw_misc_2/mem_1.png">
<meta property="og:image" content="https://czlz.net/2020/jxsw_dbw_misc_2/mem_3.png">
<meta property="og:image" content="https://czlz.net/2020/jxsw_dbw_misc_2/mem_2.png">
<meta property="og:image" content="https://czlz.net/2020/jxsw_dbw_misc_2/mem_5.png">
<meta property="og:image" content="https://czlz.net/2020/jxsw_dbw_misc_2/mem_4.png">
<meta property="og:image" content="https://czlz.net/2020/jxsw_dbw_misc_2/file.jpg">
<meta property="article:published_time" content="2020-08-07T15:15:08.275Z">
<meta property="article:modified_time" content="2020-07-14T01:49:22.200Z">
<meta property="article:author" content="粗制乱造">
<meta property="article:tag" content="CTF">
<meta property="article:tag" content="练习题">
<meta property="article:tag" content="杂项">
<meta property="article:tag" content="CTF课">
<meta name="twitter:card" content="summary">
<meta name="twitter:image" content="https://czlz.net/2020/jxsw_dbw_misc_2/keyxl_1.png">

<link rel="canonical" href="https://czlz.net/2020/jxsw_dbw_misc_2/">


<script id="page-configurations">
  // https://hexo.io/docs/variables.html
  CONFIG.page = {
    sidebar: "",
    isHome : false,
    isPost : true,
    lang   : 'zh-CN'
  };
</script>

  <title>杂项二（大比武_CTF课_第十一天） | 粗制乱造的个人网站</title>
  






  <noscript>
  <style>
  .use-motion .brand,
  .use-motion .menu-item,
  .sidebar-inner,
  .use-motion .post-block,
  .use-motion .pagination,
  .use-motion .comments,
  .use-motion .post-header,
  .use-motion .post-body,
  .use-motion .collection-header { opacity: initial; }

  .use-motion .site-title,
  .use-motion .site-subtitle {
    opacity: initial;
    top: initial;
  }

  .use-motion .logo-line-before i { left: initial; }
  .use-motion .logo-line-after i { right: initial; }
  </style>
</noscript>

</head>

<body itemscope itemtype="http://schema.org/WebPage">
  <div class="container use-motion">
    <div class="headband"></div>

    <header class="header" itemscope itemtype="http://schema.org/WPHeader">
      <div class="header-inner"><div class="site-brand-container">
  <div class="site-nav-toggle">
    <div class="toggle" aria-label="切换导航栏">
      <span class="toggle-line toggle-line-first"></span>
      <span class="toggle-line toggle-line-middle"></span>
      <span class="toggle-line toggle-line-last"></span>
    </div>
  </div>

  <div class="site-meta">

    <a href="/" class="brand" rel="start">
      <span class="logo-line-before"><i></i></span>
      <h1 class="site-title">粗制乱造的个人网站</h1>
      <span class="logo-line-after"><i></i></span>
    </a>
      <p class="site-subtitle" itemprop="description">杂七杂八的一堆东西</p>
  </div>

  <div class="site-nav-right">
    <div class="toggle popup-trigger">
        <i class="fa fa-search fa-fw fa-lg"></i>
    </div>
  </div>
</div>




<nav class="site-nav">
  <ul id="menu" class="main-menu menu">
        <li class="menu-item menu-item-home">

    <a href="/" rel="section"><i class="fa fa-home fa-fw"></i>首页</a>

  </li>
        <li class="menu-item menu-item-tags">

    <a href="/tags/" rel="section"><i class="fa fa-tags fa-fw"></i>标签</a>

  </li>
        <li class="menu-item menu-item-categories">

    <a href="/categories/" rel="section"><i class="fa fa-th fa-fw"></i>分类</a>

  </li>
        <li class="menu-item menu-item-archives">

    <a href="/archives/" rel="section"><i class="fa fa-archive fa-fw"></i>归档</a>

  </li>
        <li class="menu-item menu-item-about">

    <a href="/about/" rel="section"><i class="fa fa-user fa-fw"></i>关于</a>

  </li>
        <li class="menu-item menu-item-python">

    <a href="/pyodide/" rel="section"><i class="fa fa-user fa-fw"></i>在线Python3.8</a>

  </li>
      <li class="menu-item menu-item-search">
        <a role="button" class="popup-trigger"><i class="fa fa-search fa-fw"></i>搜索
        </a>
      </li>
  </ul>
</nav>



  <div class="search-pop-overlay">
    <div class="popup search-popup">
        <div class="search-header">
  <span class="search-icon">
    <i class="fa fa-search"></i>
  </span>
  <div class="search-input-container">
    <input autocomplete="off" autocapitalize="off"
           placeholder="搜索..." spellcheck="false"
           type="search" class="search-input">
  </div>
  <span class="popup-btn-close">
    <i class="fa fa-times-circle"></i>
  </span>
</div>
<div id="search-result">
  <div id="no-result">
    <i class="fa fa-spinner fa-pulse fa-5x fa-fw"></i>
  </div>
</div>

    </div>
  </div>

</div>
    </header>

    
  <div class="back-to-top">
    <i class="fa fa-arrow-up"></i>
    <span>0%</span>
  </div>


    <main class="main">
      <div class="main-inner">
        <div class="content-wrap">
          

          <div class="content post posts-expand">
            

    
  
  
  <article itemscope itemtype="http://schema.org/Article" class="post-block" lang="zh-CN">
    <link itemprop="mainEntityOfPage" href="https://czlz.net/2020/jxsw_dbw_misc_2/">

    <span hidden itemprop="author" itemscope itemtype="http://schema.org/Person">
      <meta itemprop="image" content="/file/avatar.png">
      <meta itemprop="name" content="粗制乱造">
      <meta itemprop="description" content="">
    </span>

    <span hidden itemprop="publisher" itemscope itemtype="http://schema.org/Organization">
      <meta itemprop="name" content="粗制乱造的个人网站">
    </span>
      <header class="post-header">
        <h1 class="post-title" itemprop="name headline">
          杂项二（大比武_CTF课_第十一天）
        </h1>

        <div class="post-meta">
            <span class="post-meta-item">
              <span class="post-meta-item-icon">
                <i class="far fa-calendar"></i>
              </span>
              <span class="post-meta-item-text">发表于</span>

              <time title="创建时间：2020-08-07 23:15:08" itemprop="dateCreated datePublished" datetime="2020-08-07T23:15:08+08:00">2020-08-07</time>
            </span>
              <span class="post-meta-item">
                <span class="post-meta-item-icon">
                  <i class="far fa-calendar-check"></i>
                </span>
                <span class="post-meta-item-text">更新于</span>
                <time title="修改时间：2020-07-14 09:49:22" itemprop="dateModified" datetime="2020-07-14T09:49:22+08:00">2020-07-14</time>
              </span>
            <span class="post-meta-item">
              <span class="post-meta-item-icon">
                <i class="far fa-folder"></i>
              </span>
              <span class="post-meta-item-text">分类于</span>
                <span itemprop="about" itemscope itemtype="http://schema.org/Thing">
                  <a href="/categories/CTF/" itemprop="url" rel="index"><span itemprop="name">CTF</span></a>
                </span>
                  ，
                <span itemprop="about" itemscope itemtype="http://schema.org/Thing">
                  <a href="/categories/CTF/%E7%AC%94%E8%AE%B0/" itemprop="url" rel="index"><span itemprop="name">笔记</span></a>
                </span>
                  ，
                <span itemprop="about" itemscope itemtype="http://schema.org/Thing">
                  <a href="/categories/CTF/%E7%AC%94%E8%AE%B0/misc/" itemprop="url" rel="index"><span itemprop="name">misc</span></a>
                </span>
                  ，
                <span itemprop="about" itemscope itemtype="http://schema.org/Thing">
                  <a href="/categories/CTF/%E7%AC%94%E8%AE%B0/misc/%E6%B5%81%E9%87%8F%E5%88%86%E6%9E%90/" itemprop="url" rel="index"><span itemprop="name">流量分析</span></a>
                </span>
            </span>

          

        </div>
      </header>

    
    
    
    <div class="post-body" itemprop="articleBody">

      
        <!-- toc -->
<pre><code>来自星星的练习题二</code></pre><a id="more"></a>
<h1 id="键盘流量分析"><a href="#键盘流量分析" class="headerlink" title="键盘流量分析"></a>键盘流量分析</h1><p>这个直接按老师教的步骤走就是了。<br><img src="keyxl_1.png" alt=""></p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">tshark -r HITCTF.pcap -T fields -e usb.capdata &gt; usbdata.txt</span><br></pre></td></tr></table></figure>
<p>先用tshark拿到USB数据。<br>然后直接丢脚本里面跑。<br>但是。。老师的脚本好像有问题呀。<br>用了同事发的脚本。。。</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">.&#x2F;UsbKeyboardDataHacker.py HITCTF.pcap</span><br></pre></td></tr></table></figure>
<p>一步就出来了<br>hhiitctf{KeyBoard_orz}</p>
<h1 id="流量分析1—666"><a href="#流量分析1—666" class="headerlink" title="流量分析1—666"></a>流量分析1—666</h1><p>题目是666.pcapng。嗯。不管怎么样吧先找flag。<br>找了半天，虽然有flag.txt的列目录。但是经过查找没有出现flag.txt相关的文件。<br>那就考虑666相关的吧。<br><img src="llfx_1.png" alt=""><br>找到一个666.jpg相关的上传代码。难度Flag不是从服务器上获得的而是从客户端上传的。<br>恢复并提取关键代码。</p>
<figure class="highlight php"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br><span class="line">8</span><br><span class="line">9</span><br><span class="line">10</span><br><span class="line">11</span><br><span class="line">12</span><br></pre></td><td class="code"><pre><span class="line"><span class="meta">&lt;?php</span></span><br><span class="line"></span><br><span class="line">$c=$_POST[<span class="string">"z2"</span>];</span><br><span class="line">$c=str_replace(<span class="string">"\r"</span>,<span class="string">""</span>,$c);</span><br><span class="line">$c=str_replace(<span class="string">"\n"</span>,<span class="string">""</span>,$c);</span><br><span class="line">$buf=<span class="string">""</span>;</span><br><span class="line"></span><br><span class="line"><span class="keyword">for</span>($i=<span class="number">0</span>;$i&lt;strlen($c);$i+=<span class="number">2</span>)&#123;</span><br><span class="line">    $buf.=urldecode(<span class="string">"%"</span>.substr($c,$i,<span class="number">2</span>));</span><br><span class="line">&#125;</span><br><span class="line"></span><br><span class="line"><span class="keyword">echo</span>(@fwrite(fopen(<span class="string">"1.jpg"</span>,<span class="string">"w"</span>),$buf)?<span class="string">"1"</span>:<span class="string">"0"</span>);;</span><br></pre></td></tr></table></figure>
<p><img src="llfx_2.png" alt=""><br>提交一下，成功生成了图片。<br><img src="llfx_3.png" alt=""></p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">foremost 666.pcapng</span><br></pre></td></tr></table></figure>
<p>分离出压缩文件，输入密码。得到flag<br>flag{3OpWdJ-JP6FzK-koCMAK-VkfWBq-75Un2z}</p>
<p>拿到flag。</p>
<h1 id="流量分析2—backdoor"><a href="#流量分析2—backdoor" class="headerlink" title="流量分析2—backdoor"></a>流量分析2—backdoor</h1><p>直接搜索flag。卧槽这个脑回路清奇。<br><img src="llfx2_1.png" alt=""><br>找到这个提示flag is here。<br>针对这个IP地址</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">ip.dst &#x3D;&#x3D; 123.123.123.123</span><br></pre></td></tr></table></figure>
<p>然后按时间排序，看看有什么。<br><img src="llfx2_2.png" alt=""><br>看了一圈，看样子flag在每个数据包的第2B位。<br>本想写一个脚本的。发现读取pcap的脚本好复杂。有空再搞吧。<br>先拿到flag<br>flag{Icmp_backdoor_can_transfer-some_infomation}</p>
<h1 id="明文攻击1"><a href="#明文攻击1" class="headerlink" title="明文攻击1"></a>明文攻击1</h1><p>看样子这题比较简单呀。<br><img src="mwgj_1.png" alt=""></p>
<h2 id="第一步"><a href="#第一步" class="headerlink" title="第一步"></a>第一步</h2><p>先看看图片里有啥东西吧。（自从学了CTF，图片就再也不是正常的图片了）<br><img src="mwgj_2.png" alt=""><br>果然有东西。<br><img src="mwgj_3.png" alt=""><br>将最后一段代码复制出来恢复成zip文件<br><img src="mwgj_4.png" alt=""><br>完美恢复，开始明文攻击。</p>
<h1 id="内存取证"><a href="#内存取证" class="headerlink" title="内存取证"></a>内存取证</h1><p>从内存中扣出数据<br><img src="mem_1.png" alt=""></p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">volatility -f mem.raw imageinfo</span><br></pre></td></tr></table></figure>
<p>得到的系统系统</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">volatility -f mem.raw --profile Win7SP1x86_23418 pslist</span><br></pre></td></tr></table></figure>
<h2 id="读取内存找flag"><a href="#读取内存找flag" class="headerlink" title="读取内存找flag"></a>读取内存找flag</h2><p>查看操内存中运行的程序信息<br><img src="mem_3.png" alt=""><br>发现notepad.exe与DumpIt.exe。<br>开始估计flag应当在这两个程序内存中的其中一个。</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br></pre></td><td class="code"><pre><span class="line">volatility -f mem.raw --profile Win7SP1x86_23418 memdump -p 3380 -D .&#x2F;</span><br><span class="line">volatility -f mem.raw --profile Win7SP1x86_23418 memdump -p 3524 -D .&#x2F;</span><br></pre></td></tr></table></figure>
<p>将这两条内存数据dump出来。</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">strings -e l 3380.dmp | grep flag</span><br></pre></td></tr></table></figure>
<p>使用strings+grep命令来找flag。可以发现里包含有flag的rar,zip,7z等文件</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">binwalk 3380.dmp</span><br></pre></td></tr></table></figure>
<p><img src="mem_2.png" alt=""><br>出现一堆文件。分离看看，能不能发现什么。</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">foremost 3380.dmp</span><br></pre></td></tr></table></figure>
<p><img src="mem_5.png" alt=""><br>得到了一堆文件。找到一个含有flag.txt的加密压缩包。<br>不知道密码，一边暴力破解，一边找找其它线索。</p>
<h2 id="找到解压密钥"><a href="#找到解压密钥" class="headerlink" title="找到解压密钥"></a>找到解压密钥</h2><p>直接在内存中搜索文件</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">volatility -f mem.raw --profile Win7SP1x86_23418 filescan | grep -E &quot;png|jpg|gif|zip|rar|7z|pdf&quot;</span><br></pre></td></tr></table></figure>
<p><img src="mem_4.png" alt=""></p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">0x000000001efb29f8      8      0 R--r-d \Device\HarddiskVolume2\Users\lethal\Pictures\无标题.png</span><br></pre></td></tr></table></figure>
<p>发现一条比较异类的文件。</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">volatility -f mem.raw --profile Win7SP1x86_23418 dumpfiles -D .&#x2F; -Q 0x000000001efb29f8</span><br></pre></td></tr></table></figure>
<p>从内存中把内存数据中dump出来，改个名。<br><img src="file.jpg" alt=""><br>估计这个应当是密钥。<br>打开压缩文件输入1YxfCQ6goYBD6Q拿到flag<br>RoarCTF{wm_D0uB1e_TC-cRypt}</p>

    </div>

    
    
    
        <div class="reward-container">
  <div>坚持原创技术分享，您的支持将鼓励我继续创作！</div>
  <button onclick="var qr = document.getElementById('qr'); qr.style.display = (qr.style.display === 'none') ? 'block' : 'none';">
    打赏
  </button>
  <div id="qr" style="display: none;">
      
      <div style="display: inline-block;">
        <img src="/file/weixin.png" alt="粗制乱造 微信支付">
        <p>微信支付</p>
      </div>
      
      <div style="display: inline-block;">
        <img src="/file/zfb.png" alt="粗制乱造 支付宝">
        <p>支付宝</p>
      </div>

  </div>
</div>


      <footer class="post-footer">
          <div class="post-tags">
              <a href="/tags/CTF/" rel="tag"># CTF</a>
              <a href="/tags/%E7%BB%83%E4%B9%A0%E9%A2%98/" rel="tag"># 练习题</a>
              <a href="/tags/%E6%9D%82%E9%A1%B9/" rel="tag"># 杂项</a>
              <a href="/tags/CTF%E8%AF%BE/" rel="tag"># CTF课</a>
          </div>

        


        
    <div class="post-nav">
      <div class="post-nav-item">
    <a href="/2020/jxsw_dbw_pwn_2/" rel="prev" title="PWN第二天（大比武_CTF课_第二十天）">
      <i class="fa fa-chevron-left"></i> PWN第二天（大比武_CTF课_第二十天）
    </a></div>
      <div class="post-nav-item">
    <a href="/2020/jxsw_dbw_web_1/" rel="next" title="MYSQL注入绕过（大比武_CTF课_第一天）">
      MYSQL注入绕过（大比武_CTF课_第一天） <i class="fa fa-chevron-right"></i>
    </a></div>
    </div>
      </footer>
    
  </article>
  
  
  



          </div>
          

<script>
  window.addEventListener('tabs:register', () => {
    let { activeClass } = CONFIG.comments;
    if (CONFIG.comments.storage) {
      activeClass = localStorage.getItem('comments_active') || activeClass;
    }
    if (activeClass) {
      let activeTab = document.querySelector(`a[href="#comment-${activeClass}"]`);
      if (activeTab) {
        activeTab.click();
      }
    }
  });
  if (CONFIG.comments.storage) {
    window.addEventListener('tabs:click', event => {
      if (!event.target.matches('.tabs-comment .tab-content .tab-pane')) return;
      let commentClass = event.target.classList[1];
      localStorage.setItem('comments_active', commentClass);
    });
  }
</script>

        </div>
          
  
  <div class="toggle sidebar-toggle">
    <span class="toggle-line toggle-line-first"></span>
    <span class="toggle-line toggle-line-middle"></span>
    <span class="toggle-line toggle-line-last"></span>
  </div>

  <aside class="sidebar">
    <div class="sidebar-inner">

      <ul class="sidebar-nav motion-element">
        <li class="sidebar-nav-toc">
          文章目录
        </li>
        <li class="sidebar-nav-overview">
          站点概览
        </li>
      </ul>

      <!--noindex-->
      <div class="post-toc-wrap sidebar-panel">
          <div class="post-toc motion-element"><ol class="nav"><li class="nav-item nav-level-1"><a class="nav-link" href="#键盘流量分析"><span class="nav-number">1.</span> <span class="nav-text">键盘流量分析</span></a></li><li class="nav-item nav-level-1"><a class="nav-link" href="#流量分析1—666"><span class="nav-number">2.</span> <span class="nav-text">流量分析1—666</span></a></li><li class="nav-item nav-level-1"><a class="nav-link" href="#流量分析2—backdoor"><span class="nav-number">3.</span> <span class="nav-text">流量分析2—backdoor</span></a></li><li class="nav-item nav-level-1"><a class="nav-link" href="#明文攻击1"><span class="nav-number">4.</span> <span class="nav-text">明文攻击1</span></a><ol class="nav-child"><li class="nav-item nav-level-2"><a class="nav-link" href="#第一步"><span class="nav-number">4.1.</span> <span class="nav-text">第一步</span></a></li></ol></li><li class="nav-item nav-level-1"><a class="nav-link" href="#内存取证"><span class="nav-number">5.</span> <span class="nav-text">内存取证</span></a><ol class="nav-child"><li class="nav-item nav-level-2"><a class="nav-link" href="#读取内存找flag"><span class="nav-number">5.1.</span> <span class="nav-text">读取内存找flag</span></a></li><li class="nav-item nav-level-2"><a class="nav-link" href="#找到解压密钥"><span class="nav-number">5.2.</span> <span class="nav-text">找到解压密钥</span></a></li></ol></li></ol></div>
      </div>
      <!--/noindex-->

      <div class="site-overview-wrap sidebar-panel">
        <div class="site-author motion-element" itemprop="author" itemscope itemtype="http://schema.org/Person">
    <img class="site-author-image" itemprop="image" alt="粗制乱造"
      src="/file/avatar.png">
  <p class="site-author-name" itemprop="name">粗制乱造</p>
  <div class="site-description" itemprop="description"></div>
</div>
<div class="site-state-wrap motion-element">
  <nav class="site-state">
      <div class="site-state-item site-state-posts">
          <a href="/archives/">
        
          <span class="site-state-item-count">43</span>
          <span class="site-state-item-name">日志</span>
        </a>
      </div>
      <div class="site-state-item site-state-categories">
            <a href="/categories/">
          
        <span class="site-state-item-count">37</span>
        <span class="site-state-item-name">分类</span></a>
      </div>
      <div class="site-state-item site-state-tags">
            <a href="/tags/">
          
        <span class="site-state-item-count">59</span>
        <span class="site-state-item-name">标签</span></a>
      </div>
  </nav>
</div>



      </div>

    </div>
  </aside>
  <div id="sidebar-dimmer"></div>


      </div>
    </main>

    <footer class="footer">
      <div class="footer-inner">
        

        

<div class="copyright">
  
  &copy; 
  <span itemprop="copyrightYear">2020</span>
  <span class="with-love">
    <i class="fa fa-heart"></i>
  </span>
  <span class="author" itemprop="copyrightHolder">粗制乱造</span>
</div>
  <div class="powered-by">由 <a href="https://czlz.net/" class="theme-link">czlz.net</a> 强力驱动
  </div>

        








      </div>
    </footer>
  </div>

  
  <script src="/lib/anime.min.js"></script>
  <script src="/lib/velocity/velocity.min.js"></script>
  <script src="/lib/velocity/velocity.ui.min.js"></script>

<script src="/js/utils.js"></script>

<script src="/js/motion.js"></script>


<script src="/js/schemes/pisces.js"></script>


<script src="/js/next-boot.js"></script>




  




  
<script src="/js/local-search.js"></script>













  

  

</body>
</html>
