其他分享
首页 > 其他分享> > 攻防世界Shuffle

攻防世界Shuffle

作者:互联网

在这里插入图片描述找到main函数在这里插入图片描述查看伪代码
在这里插入图片描述

int __cdecl main(int argc, const char **argv, const char **envp)
{
  time_t v3; // ebx@1
  __pid_t v4; // eax@1
  unsigned int v5; // ST18_4@2
  unsigned int v6; // ST1C_4@2
  char v7; // ST20_1@2
  int result; // eax@4
  int v9; // esi@4
  signed int i; // [sp+14h] [bp-44h]@1
  char v11; // [sp+24h] [bp-34h]@1
  char v12; // [sp+25h] [bp-33h]@1
  char v13; // [sp+26h] [bp-32h]@1
  char v14; // [sp+27h] [bp-31h]@1
  char v15; // [sp+28h] [bp-30h]@1
  char v16; // [sp+29h] [bp-2Fh]@1
  char v17; // [sp+2Ah] [bp-2Eh]@1
  char v18; // [sp+2Bh] [bp-2Dh]@1
  char v19; // [sp+2Ch] [bp-2Ch]@1
  char v20; // [sp+2Dh] [bp-2Bh]@1
  char v21; // [sp+2Eh] [bp-2Ah]@1
  char v22; // [sp+2Fh] [bp-29h]@1
  char v23; // [sp+30h] [bp-28h]@1
  char v24; // [sp+31h] [bp-27h]@1
  char v25; // [sp+32h] [bp-26h]@1
  char v26; // [sp+33h] [bp-25h]@1
  char v27; // [sp+34h] [bp-24h]@1
  char v28; // [sp+35h] [bp-23h]@1
  char v29; // [sp+36h] [bp-22h]@1
  char v30; // [sp+37h] [bp-21h]@1
  char v31; // [sp+38h] [bp-20h]@1
  char v32; // [sp+39h] [bp-1Fh]@1
  char v33; // [sp+3Ah] [bp-1Eh]@1
  char v34; // [sp+3Bh] [bp-1Dh]@1
  char v35; // [sp+3Ch] [bp-1Ch]@1
  char v36; // [sp+3Dh] [bp-1Bh]@1
  char v37; // [sp+3Eh] [bp-1Ah]@1
  char v38; // [sp+3Fh] [bp-19h]@1
  char v39; // [sp+40h] [bp-18h]@1
  char v40; // [sp+41h] [bp-17h]@1
  char v41; // [sp+42h] [bp-16h]@1
  char v42; // [sp+43h] [bp-15h]@1
  char v43; // [sp+44h] [bp-14h]@1
  char v44; // [sp+45h] [bp-13h]@1
  char v45; // [sp+46h] [bp-12h]@1
  char v46; // [sp+47h] [bp-11h]@1
  char v47; // [sp+48h] [bp-10h]@1
  char v48; // [sp+49h] [bp-Fh]@1
  char v49; // [sp+4Ah] [bp-Eh]@1
  char v50; // [sp+4Bh] [bp-Dh]@1
  int v51; // [sp+4Ch] [bp-Ch]@1

  v51 = *MK_FP(__GS__, 20);
  v11 = 83;
  v12 = 69;
  v13 = 67;
  v14 = 67;
  v15 = 79;
  v16 = 78;
  v17 = 123;
  v18 = 87;
  v19 = 101;
  v20 = 108;
  v21 = 99;
  v22 = 111;
  v23 = 109;
  v24 = 101;
  v25 = 32;
  v26 = 116;
  v27 = 111;
  v28 = 32;
  v29 = 116;
  v30 = 104;
  v31 = 101;
  v32 = 32;
  v33 = 83;
  v34 = 69;
  v35 = 67;
  v36 = 67;
  v37 = 79;
  v38 = 78;
  v39 = 32;
  v40 = 50;
  v41 = 48;
  v42 = 49;
  v43 = 52;
  v44 = 32;
  v45 = 67;
  v46 = 84;
  v47 = 70;
  v48 = 33;
  v49 = 125;
  v50 = 0;
  v3 = time(0);
  v4 = getpid();
  srand(v3 + v4);
  for ( i = 0; i <= 99; ++i )
  {
    v5 = rand() % 0x28u;
    v6 = rand() % 0x28u;
    v7 = *(&v11 + v5);
    *(&v11 + v5) = *(&v11 + v6);
    *(&v11 + v6) = v7;
  }
  puts(&v11);
  result = 0;
  v9 = *MK_FP(__GS__, 20) ^ v51;
  return result;
}

R键
在这里插入图片描述

标签:__,攻防,v11,Shuffle,int,sp,世界,char,bp
来源: https://blog.csdn.net/starmultiple/article/details/122682821