Platform:
Unix/linux etc.
Description
This is the first crackme i ever created, also the first piece of asm code i ever wrote, as you can take from the name, it grew from a hello-world example.
I still would rate it as difficulty 2 since most level 1 crackmes are kind of obvious to solve once you open them in some debugger.
You must be logged in to post a comment
zer0sun on 2019-02-04 07:06: Please enter your name: 1234
Hello 1234
Enter your Password: 6789
Great H4x0r Skillz!
use gdb to debug the program,'crackme' just compare the username & password with number 5
zer0sun on 2019-02-04 08:58: as a beginer,this is great,tks~~
tanmaybhushan on 2019-02-12 19:43: It has a bug or may be that was the intention, it loops over the length of password, not over the length of username.
Please enter your name: hello
Hello hello
Enter your Password: m
Great H4x0r Skillz!
Don't see any place to upload solution
Uzernem on 2019-02-12 20:18: @zer0sun Don't post the solution in the comments, post it in the solution.
lala74 on 2019-08-11 13:36: I don't see any place to upload solution so I post it here :D
After using gdb to disassemble the program, the function to verify the password is _start.l1
It takes the (length_password)th value of name + 5 and compares it with the last value of password
Ex: name: 1000000000, pass : 6, so the process will take the first value of name (length of pass = 1), it's 1, sum with 5 = 6 and the last value of pass is 6. They are equal so we break the program :D
OmniScientist on 2019-12-05 23:33: I'm super beginner to this thing, I can fiddle with the binary with gdb but I don't know how to use gdb on the binary inside the zip file, so how could I use gdb in this case
mp on 2020-08-23 10:08: Nice crack me for beginners. I would suggest resetting the color in _start.exit
Aether on 2020-11-19 12:36: Nice crackme. I would suggest too to resetting the color in _start.exit
RobertoSpartan on 2020-12-26 14:30: Nice example, no bugs but lot of distractions (for beginners at least).
there is a password length and not all input is OK, not gonna reveal it in this comment. Wurth trying.
You must be logged in to submit a writeup
Solution by shreyansh26 on 2019-02-09 09:26:
Solution by shreyansh26
Solution by calo on 2019-03-02 02:46:
Simple but fun. Cheers.
Solution by vastopol on 2019-09-19 07:20:
write up, explanation, and disassembly included
Solution by alklazema on 2020-05-29 11:14:
A nice Caesar cipher puzzle. Thanks.
Solution by RobertoSpartan on 2020-12-26 14:31:
cracked with objdump, reading assembly code and finally edb debugger. (sudo apt install edb-debugger should do the trick on Ubuntu like systems)
Solution by Jenya on 2023-11-18 17:09:
nice i loved it
Solution by RevBeginner on 2024-03-13 13:56:
static reverse
Solution by sense_net on 2025-09-06 22:50:
Nice man, thnx