在这个crackme解决方案中,首先找到了字符串:
$ rabin2 -z crackserial_linux
addr=0x00000aa0 off=0x00000aa0 ordinal=000 sz=7 len=7 section=.rodata type=A string=User:
addr=0x00000aa7 off=0x00000aa7 ordinal=001 sz=11 len=11 section=.rodata type=A string=Password:
addr=0x00000ab2 off=0x00000ab2 ordinal=002 sz=10 len=10 section=.rodata type=A string=Good job!
addr=0x00000abc off=0x00000abc ordinal=003 sz=10 len=10 section=.rodata type=A string=Try again
在寻找“干得好”的引用之后。
$ radare2 crackserial_linux
-- How about a nice game of chess?
[0x080488c4]> /c ab2
f hit_0 @ 0x08048841 # 5: push 0x8048ab2
[0x080488c4]>
我尝试了同样的事情,但对我来说不起作用:
$ r2 crackserial_linux
[0x080488d0]> !!rabin2 -z crackserial_linux
[strings]
addr=0x08048d80 off=0x00000d80 ordinal=000 sz=7 section=.rodata string=User:
addr=0x08048d87 off=0x00000d87 ordinal=001 sz=9 section=.rodata string=Serial:
addr=0x08048d90 off=0x00000d90 ordinal=002 sz=10 section=.rodata string=Good job!
addr=0x08048d9a off=0x00000d9a ordinal=003 sz=10 section=.rodata string=Try again
4 strings
[0x080488d0]> /c d90
[0x080488d0]>
顺便说一句,为什么我的情况下的字符串在不同的位置?