toaster on 5:36 PM 06/16/2019: By encrypted code i meant the VIP code
HN1 on 5:51 PM 06/16/2019: I found the vip code!
Name: joe
Vip code: f5gz51xyxy6ggj96j1mlgz21j
HN1 on 5:54 PM 06/16/2019: Very easy crackme! Well anyway it was interesting! So thank you for another crackme!
HN1 on 6:24 PM 06/16/2019: Name: monkey
Vip code: iyi922jyjyjy2o6gd2l6g89x6
toaster on 7:38 PM 06/16/2019: Thanks! The reason why I posted it is because I couldn't do it by myself. I'm using x64dbg, im a beginner, and when im debugging the file I managed to find only the input string, initial names and vip codes but not the decrypted codes. Can you explain how you found it in the solutions/comment please?
HN1 on 7:48 PM 06/16/2019: This function 00401AA0 is responsible for encryption and decryption of the VIP key. And so, you put breakpoint on the address of the function 00401CF0 and in the EDX register the address will be not encrypted code, then go to the dump, and there after the execution of the function 00401CF0 in the dump you will see how the code has changed.
cqpwx on 3:28 PM 06/24/2019: joe f5gz51xyxy6ggj96j1mlgz21j
nick bac468i2fxctzvrfm55eqx0qe
monkey iyi922jyjyjy2o6gd2l6g89x6
dmitry kyjfq318ryygbtm927bqd7a78
leonard elwf6492ql0n27y4gx7d354g6
But only joe and monkey works?
qwertzuiop on 7:33 PM 07/01/2019: what is the password for to extract the file???
qwertzuiop on 7:33 PM 07/01/2019: what is the password for to extract the file???
gerbik on 2:56 AM 07/09/2019: Why are there so many functions in this program? There are over 2000 functions, but it looks like most of them do things like check for exceptions or do very small operations like moving registers around. Is this IDA not functioning correctly or just the a byproduct of the compiler?
DrSpawn on 2:08 PM 09/25/2019: Subject can be patched a little bit.
vip_access_me.exe
000B680F:0F-90
000B6810:84-90
000B6811:BF-90
000B6812:03-90
000B6813:00-90
000B6814:00-90
illQuo on 2:23 PM 10/03/2019: This needs to at least be a medium. I need someone to write a write up of every step on how they solved it. Forever stuck.
va1erk on 3:47 PM 10/04/2019: Can you help me by steps how to "crack" this program?
b1h0 on 2:51 PM 10/05/2019: Only works VIP Codes for user joe and monkey.
The function that really matters to us. The one that decrypts the VIP Code. It is in the address **00401CF0**.
Just put a breakpoint at address **00401D67** and check that it is what is loaded into the **EAX** register that contains the memory address where the **VIP CODE** is.
My solution in Github.
https://github.com/gabimarti/crackmes-solutions/tree/master/crackmes.one/toaster-VIP_access_me
juansacco on 1:49 PM 10/10/2019: Are you a vip member? (y/n): y
What is your name?: joe
Please enter your vip code: f5gz51xyxy6ggj96j1mlgz21j
Welcome vip member joe!
#######################################
# _ #
# -=\`\ #
# |\ ____\_\__ #
# -=\c``) #
# `~~~~~/ /~~` #
# -==/ / #
# #
#######################################
Press any key to continue . . .
niros on 7:09 PM 11/12/2019: Are you a vip member? (y/n): y
What is your name?: joe
Please enter your vip code: f5gz51xyxy6ggj96j1mlgz21j
Welcome vip member joe!
#######################################
# _ #
# -=\`\ #
# |\ ____\_\__ #
# -=\c``) #
# `~~~~~/ /~~` #
# -==/ / #
# #
#######################################
Press any key to continue . . .
Are you a vip member? (y/n): y
What is your name?: monkey
Please enter your vip code: iyi922jyjyjy2o6gd2l6g89x6
Welcome vip member monkey!
#######################################
# _ #
# -=\`\ #
# |\ ____\_\__ #
# -=\c``) #
# `~~~~~/ /~~` #
# -==/ / #
# #
#######################################
Press any key to continue . . .
ayushdosaj on 12:20 PM 12/14/2019: yay! solved.
droireas on 4:38 PM 02/20/2020: Here is a video solution walkthrough that I have created:
https://www.youtube.com/watch?v=M265OsQl8Js
Slaktaren on 9:00 PM 09/26/2020: This is not "Very Easy". However, very fun one.
The users and the encrypted passwords are quite obvious how to get. But I had trouble finding where and how encryption/decryption was done. I checked the youtube video above, but honestly, that didn't really explain much.
I was only using x32dbg at first but I installed Ghidra later which helped a lot. I found a place where it compares the lengths of the input password and of the decrypted password. If you have the same length, then it came to a memcmp call comparing the passwords. That was enough to convince me that I understood how to solve this.
askuytr78 on 12:12 PM 04/02/2022: Are you a vip member? (y/n): y
What is your name?: joe
Please enter your vip code: f5gz51xyxy6ggj96j1mlgz21j
Welcome vip member joe!
#######################################
# _ #
# -=\`\ #
# |\ ____\_\__ #
# -=\c``) #
# `~~~~~/ /~~` #
# -==/ / #
# #
#######################################
PopaCracker on 2:56 PM 06/30/2022: Дмитрий, я вас взломаю. Довольно изичный кряк
PopaCracker on 3:10 PM 06/30/2022: MOV DWORD PTR SS:[ESP+4],4BC078 Here
loyadia on 9:43 AM 01/20/2023: Page 4 of 167 1, 663 results buy cialis online forum These currents I Cl, Vol were sensitive to several known Cl channel inhibitors, including DIDS, tamoxifen, and 5 nitro 2 3 phenylpropylamino benzoate NPPB