吾爱破解 - 52pojie.cn

 找回密码
 注册[Register]

QQ登录

只需一步,快速开始

查看: 1433|回复: 2
收起左侧

[Android 求助] jeb反编译出来的变量值不对,怎么解决

[复制链接]
wgf4242 发表于 2020-4-26 12:34
本帖最后由 wgf4242 于 2020-4-26 12:38 编辑

https://dn.jarvisoj.com/challengefiles/DDCTF-Easy.apk.64812266499cc050ac23e190e53b87f7

dex2jar出来的是

[Python] 纯文本查看 复制代码
p = [ -40, -62, 107, 66, -126, 103, -56, 77, 122, -107, -24, -127, 72, -63, -98, 64, -24, -5, -49, -26, 79, -70, -26, -81, 120, 25, 111, -100, -23, -9, 122, -35, 66, -50, -116, 3, -72, 102, -45, -85, 0, 126, -34, 62, 83, -34, 48, -111, 61, -9, -51, 114, 20, 81, -126, -18, 27, -115, -76, -116, -48, -118, -10, -102, -106, 113, -104, 98, -109, 74, 48, 47, -100, -88, 121, 22, -63, -32, -20, -41, -27, -20, -118, 100, -76, 70, -49, -39, -27, -106, -13, -108, 115, -87, -1, -22, -53, 21, -100, 124, -95, -40, 62, -69, 29, 56, -53, 85, -48, 25, 37, -78, 11, -110, -24, -120, -82, 6, -94, -101]
q = [-57, -90, 53, -71, -117, 98, 62, 98, 101, -96, 36, 110, 77, -83, -121, 2, -48, 94, -106, -56, -49, -80, -1, 83, 75, 66, -44, 74, 2, -36, -42, -103, 6, -115, -40, 69, -107, 85, -78, -49, 54, 78, -26, 15, 98, -70, 8, -90, 94, -61, -84, 64, 112, 51, -29, -34, 126, -21, -126, -71, -31, -24, -60, -2, -81, 66, -84, 85, -91, 10, 84, 70, -8, -63, 26, 126, -76, -104, -123, -71, -126, -62, -23, 11, -39, 70, 14, 59, -101, -39, -124, 91, -109, 102, -49, 21, 105, 0, 37, 0, -57, 117, 110, -115, -86, 56, 25, -46, -55, 7, -125, 109, 76, 104, -15, 82, -53, 18, -28, -24]



jeb出来的是
[Java] 纯文本查看 复制代码
FlagActivity.p = new byte[]{-40, -62, 107, 66, 0x82, 103, -56, 77, 0x7A, -107, -24, 0x81, 72, 0xC1, -98, 0x40, -24, -5, -49, -26, 0x4F, -70, -26, -81, 120, 25, 0x6F, -100, -23, -9, 0x7A, -35, 66, -50, 0x8C, 3, -72, 102, -45, -85, 0, 0x7E, -34, 62, 83, -34, 0x30, 0x91, 61, -9, -51, 0x72, 20, 81, 0x82, -18, 27, 0x8D, -76, 0x8C, 0xD0, 0x8A, -10, -102, -106, 0x71, -104, 98, -109, 74, 0x30, 0x2F, -100, -88, 0x79, 22, 0xC1, 0xE0, -20, -41, -27, -20, 0x8A, 100, -76, 70, -49, -39, -27, -106, -13, -108, 0x73, -87, -1, -22, -53, 21, -100, 0x7C, 0xA1, -40, 62, -69, 29, 56, -53, 85, 0xD0, 25, 37, -78, 11, -110, -24, -120, -82, 6, -94, -101};
        FlagActivity.q = new byte[]{-57, -90, 53, -71, 0x8B, 98, 62, 98, 101, 0xA0, 36, 110, 77, -83, 0x87, 2, 0xD0, 94, -106, -56, -49, -80, -1, 83, 75, 66, -44, 74, 2, -36, -42, -103, 6, 0x8D, -40, 69, -107, 85, -78, -49, 54, 78, -26, 15, 98, -70, 8, -90, 94, -61, -84, 0x40, 0x70, 51, -29, -34, 0x7E, -21, 0x82, -71, 0xE1, -24, -60, -2, -81, 66, -84, 85, -91, 10, 84, 70, -8, 0xC1, 26, 0x7E, -76, -104, 0x85, -71, 0x82, -62, -23, 11, -39, 70, 14, 59, -101, -39, 0x84, 91, -109, 102, -49, 21, 105, 0, 37, 0x80, -57, 0x75, 110, 0x8D, -86, 56, 25, -46, -55, 7, 0x83, 109, 76, 104, -15, 82, -53, 18, -28, -24};
    }


-40, -62, 107, 66, -126,

-40, -62, 107, 66, 0x82,

看bytecode窗口是 -0x7e ,应该是-126啊。。。不知道怎么转了0x82了。

[Asm] 纯文本查看 复制代码
.array-data 1 x 0x78
              -0x28
              -0x3E
              0x6B
              0x42
              -0x7E
              0x67
              -0x38



差太多了。为什么这样?怎么解决?

发帖前要善用论坛搜索功能,那里可能会有你要找的答案或者已经有人发布过相同内容了,请勿重复发帖。

daydayupup 发表于 2020-6-2 13:23
-126的16进制,在编译器里就是0x82

0x82.png
梦迪丶 发表于 2020-6-3 08:36
您需要登录后才可以回帖 登录 | 注册[Register]

本版积分规则

返回列表

RSS订阅|小黑屋|处罚记录|联系我们|吾爱破解 - LCG - LSG ( 京ICP备16042023号 | 京公网安备 11010502030087号 )

GMT+8, 2024-11-16 00:00

Powered by Discuz!

Copyright © 2001-2020, Tencent Cloud.

快速回复 返回顶部 返回列表