Share how awesome the crack me was or where you struggle to finish it! Stay polite and do not spoil the solution/flag!
Author:
cbm-hackers
Language:
C/C++
Upload:
2018-09-01 06:54
Platform:
Unix/linux etc.
Difficulty:
1.3
Quality:
4.8
Arch:
x86-64
Downloads:
169
Writeups:
34
Comments:
55
Description
an easy crackme
You must be logged in to post a comment
You must be logged in to submit a writeup
Solution by kellek on 2018-09-15 10:29:
Solution attached.
Contains the reverse engineered crackme (source file) and gdb dump comments.
Solution by Tristan on 2018-09-19 21:52:
obviously, no keygen.py is required for this one
Solution by TristanRice on 2018-09-26 15:58:
Solution attached
Solution by mogamiriver on 2018-11-11 10:00:
Analysis of the main section and a one-liner keygen
Solution by MaksLoboda on 2018-11-18 15:02:
My first ever solution(attached)
Solution by nutcake on 2018-12-07 00:45:
Text file with walkthrough.
Solution by thehood on 2018-12-13 17:42:
Text File Walkthrough with the radare2 assembly code.
Solution by Yuri on 2018-12-25 07:58:
My Solution, text file with source and gdb dump.
Solution by niedziol on 2019-01-12 18:39:
Solution by calo on 2019-02-08 05:22:
Was fun. Write up includes, challenge rewrite, flag_generator python script and commented assembly (r2)
Solution by D4RKFL0W on 2019-03-02 22:37:
Solution by migsaldivar on 2019-03-13 00:05:
Solution by chankruze on 2019-03-21 23:20:
changing the implementation-defined signature to did the magick.
Solution by elprofesor on 2019-04-02 14:09:
You will find: "decompilation.txt" which is the decompilation of main function.
"readme.md" which explains the whole process.
"keygen.py" which generate 10 keys.
Solution by Antricks on 2019-07-05 16:47:
I pasted a controll-flow graph from radare 2 here so maybe some text editors will not show this file correctly. With vscode or kate it should work :D
Solution by neighborino on 2019-07-21 11:01:
Solution attached. Solution includes disassembled main function with comments
Solution by usr404 on 2019-08-17 10:00:
Decompiled using Ghidra & performed simple examination of control flow of `main` function
Solution by vastopol on 2019-09-08 19:25:
Solution by Bkamp on 2019-12-03 12:54:
Very cool crackme. Enjoyed quite a bit :)
Solution by richardcanuck on 2019-12-06 16:16:
Decompiled using Ghidra. The file contains the commented code and the solution!
Solution by 4rr4y on 2020-02-24 08:40:
First crackme
Solution by tgsm on 2020-05-09 06:24:
Solution by rek on 2020-06-15 04:58:
Solution by arkountos on 2020-12-18 12:46:
Solution by toolb0x on 2020-12-21 12:16:
thanks, it was funny
Solution by qjig on 2020-12-29 02:31:
Solution by oracle on 2021-04-14 12:07:
first solution
Solution by redkage on 2021-04-28 11:51:
Used Cutter for disassembly
Solution by pilot538 on 2021-06-04 18:46:
Solution by ntk on 2021-09-27 07:38:
Solution by MANA624 on 2021-10-08 03:41:
This is very simple RE problem. Here's a simple solution :)
Solution by Sanca on 2025-02-05 18:34:
my first crackmes problem
Solution by fieldhamster on 2025-02-11 23:42:
Solution by DRS_Steel on 2025-12-29 22:01:
Static analysis using objdump. Identified 3 checks in main():
1. argc == 2 (need exactly 1 argument)
2. strlen(password) == 10 (0xa in hex)
3. password[4] == '@' (0x40 in hex)
Valid password format: XXXX@XXXXX (10 chars, '@' at index 4)
Example: test@psswd → flag{test@psswd}