Jmp-pop on 2:27 PM 09/24/2019: I'm having some trouble with this one, any chance you could push me in the right direction or i can email you
BinaryNewbie on 3:48 PM 09/24/2019: Hi, yes, email me: vitor.oliveira.24.24@gmail.com
unc4nny on 12:16 PM 09/26/2019: I just sent a solution, is it acceptable?
BinaryNewbie on 2:53 PM 09/26/2019: I didn't receive the email, but when i receive, i will see it.
newbie_student on 6:17 PM 09/30/2019: hi,flag it's just for me or i must input somewhere ? ) good source )
BinaryNewbie on 8:06 PM 09/30/2019: Hi, the flag is only need for unzip the source, btw, try to submit your solution, i would like to see how did you solve it.
newbie_student on 10:14 PM 09/30/2019: tmp = 97, interesting idea) ... your second, and third crackeme a much harder
and i like your anti-debug tricks)
Ass1st4nt..., i'm just newbie_student )
BinaryNewbie on 11:54 PM 09/30/2019: Thank you for your sharing your opinion, i hope that you did enjoy, try to solve my second and third crackme. The 97 is just the ascii value of 'a', and my anti debug trick for this one were only ptrace and some code obfuscation, but the others have an anti-disassembly trick and the last one has a little surprise.
BinaryNewbie on 11:54 PM 09/30/2019: Thank you for your sharing your opinion, i hope that you did enjoy, try to solve my second and third crackme. The 97 is just the ascii value of 'a', and my anti debug trick for this one were only ptrace and some code obfuscation, but the others have an anti-disassembly trick and the last one has a little surprise.
ragnar_crackbeard87 on 7:23 PM 02/26/2020: Thanks for a fun one! Thanks for giving us the source code to contrast and compare with afterwards too! :)
sheratom on 4:12 PM 02/27/2020: i don't get what does the function sub_41ECC0 do. anyone explain to me plz(i'm a new)
tim0tei on 4:21 PM 03/08/2020: Flag: "_...f3ss0r"
I really enjoyed this one. Could learn something about anti-debug and the pain due tracing modifying code:-) Thanks for sharing the source!
jeffli6789 on 6:44 AM 03/16/2020: @sheratom. That is malloc(). There are several hints for it. 1). It is super complicated and it does not like part of the code to check the key. 2). It is called a lot of times in the program. 3). Its return value is used as a buffer.
jimsktsmith on 4:01 PM 02/06/2022: Pass zip : jcdefghiab
Flag : FL4G{Ass1st4nt_Pr0f3ss0r}
priyaaanshut on 6:49 AM 10/20/2023: hello BinaryNewbie, Although you said that patching is not allowed I can still see the solutions changing the values of some registers to bypass ptrace check. Is this the correct approach?