[随波逐流]CTF Flags

   [随波逐流]CTF Flags

软件版本:v1.0.0   数据版本: v20260201
返    回

Notepad.exe

 广告模块
ID: 2099
标题: Notepad.exe
描述: Challenge Details It is a powerful scripting language created in Jan 1999 for Microsoft Windows, you can do a lot of amazing things with like creating the new notepad ? If you encounter Anti Virus threat alert from your antivirus, please run it in a sandbox environment. Key concepts Static reverse engineering (Strings, Ghidra, Ida), AutoIt Reversing, Sandboxing, Malware Analysis, Dynamic Debugging Learning Objectives Participants will learn about malware analysis such running the sample in sandbox environment, performing static analysis on the binary sample to recover strings to discover that its a autoit binary. If participants were to perform advanced static analysis/dynamically debug the binary (Rabbit Hole) using Ida/Ghidra/WinDbg, they will also learn about concepts such as anti debugging Then, participants will learn about deofuscating code as they analyse the recovered au3 script to get back the flag Author Tensor (Yong Liang)
类型: CTF-2023
网站: bugku
题目链接: https://ctf.bugku.com/challenges/detail/id/2246.html
赛事: Welcome
年度: None
Flag值: 32
writeup: https://www.luogu.com.cn/problem/CF1672E
答案错误,我要更正