Share how awesome the crackme was or where you struggle to finish it! Stay polite and do not spoil the solution/flag!
Please keep the comments section English-only.
Author:
evilprogrammer
Language:
C/C++
Upload:
2019-08-25 21:43
Platform:
Windows
Difficulty:
1.6
Quality:
4.2
Arch:
x86
Downloads:
57
Size:
101.63 KB
Writeups:
4
Comments:
73
Description
This is a very easy flag, i made with love for you, there are two ways to resolve it. I hope you will have fun.
You must be logged in to post a comment
You must be logged in to submit a writeup
Solution by 0xNinja on 2019-09-07 12:12:
Solution by b1h0 on 2019-09-19 22:56:
# [evilprogrammer's mexican](https://crackmes.one/crackme/5d63011533c5d46f00e2c305)
## Crackme by [b1h0](https://crackmes.one/user/b1h0)
- Used **x64dbg** debbuger.
- Once the **EntryPoint** is located, you can verify that at the address **0x00401500** a subroutine begins, which is the one shown in the *flag* text. We will call this subroutine: **sub_result_cracked**

- Then later we can find in the address **0x004013dd** a call to the address **0x0040162c** which is the subroutine that we will call **sub_compare_crackme**. We establish a breakpoint there and then continue step by step.

- Finally at address **0x00401642** we find a comparison of the value **0xC1** with the value 0xC1. The key is that the two values have to be different, and in particular the first one greater than the second, therefore we change the first 0xC1 for a greater value, or the second 0xC1 for a smaller value.

- So we change the *0xC1* value of the comparison line to a lower value. For example, **0 (zero)**

- And the flag message appears. Printed message: **flag{M3x1c4nMl4lw4r3_pl3rro}**

Solution by Stingered on 2020-03-11 20:07:
Text file containing my solution and patch details.
Ciao,
Stingered
Solution by 6C615F6C6C6F726F6E61 on 2020-11-23 01:03:
With Ghidra