http://bit.ly/2Ro0Y7K
the serial computational algorithm in the blow IDA photo,based on the Username where you input.
and the very easy python script is here
username="admin2" #input username here and makesure username length >5
#username.__len__( ) >5
username_len = username.__len__()
char1 = username[3]
value1= ord(char1) ^ 0x1337
value2 = value1 + 0x5EEDED
counter =0
for i in range(100):
if counter < username_len:
char_tem = username[counter]
if ord(char_tem) < 0x1F:
return_value = 1
break
tem_value3 = ord(char_tem)^ value2
tem_value4 = ((tem_value3 * 0x88233B2B)& 0xffffffff00000000)>>(2*2*8)
tem_value5 = tem_value3 - tem_value4
tem_value5 = tem_value5 >> 1
tem_value6 = tem_value4 + tem_value5
tem_value6 = tem_value6 >> 0xa
tem_value7 = tem_value6 * 0x539
tem_value8 = tem_value3 - tem_value7
value2=tem_value8+value2
counter = counter + 1
else:
print("Username:{} ,Serial:{}".format(username,value2))
break
result:
The post MBE lab01A Ansower Script appeared first on cole.
http://bit.ly/2WtSWOP reverse engineering, lab1A, MBE, RPISEC, 逆向分析 January 29, 2019 at 01:20PM
评论
发表评论