X-CTF(REVERSE高级) APK-逆向2

1.查壳。c#文件,无壳,提示使用relector编译

 2.反编译。请求本地接口传数据

 3.使用python代码搭建socket接口

import http.server
server_address = ('127.0.0.1', 31337)
handler_class = http.server.BaseHTTPRequestHandler
httpd = http.server.HTTPServer(server_address, handler_class)
httpd.serve_forever()

4.双击运行程序

 得到flag

CTF{7eb67b0bb4427e0b43b40b6042670b55}

relector破解方法及工具:

https://www.52pojie.cn/thread-311707-1-1.html

原文地址:https://www.cnblogs.com/blackicelisa/p/15251613.html