Share how awesome the crack me was or where you struggle to finish it! Stay polite and do not spoil the solution/flag!
3:07 PM 07/23/2022
Hard crackme. No patching! (You can patch antidebug ofc) Try to find secret key to get "Correct password" to print to the chat. Difficulty 3-4? If you need hints, please read hint.txt.
joaovitorbf on 10:29 PM 08/14/2022: Great crackme! Solved it after some hours, struggled with the obfuscated strings. Using CyberChef and Python to investigate the strings the program was moving during debugging really helped. Learned a lot! :)
Rouzeee on 12:14 PM 08/26/2022: kong strong pistaa panettamaan - pass супер легкий крякми ахъхахВАХЫВАХЫВХАЫВХА блять какой 3.0
CrushedKiwi on 8:37 AM 08/28/2022: really awesome challenge from pwn import xor ct = "822=" val = 0x53 print(xor(ct, val))
Sems on 4:20 PM 09/04/2022: I put all the suppressable ascii characters into the program and created a table by writing them all decrpyt. Then I prepared the encrypted version of the checked password by looking at this table. I guess there was xor involved :D If so, how did you find out about it? I used a primitive method.
Sems on 4:29 PM 09/04/2022: I just looked and yes, the key is 0x53 and it encrpyts our input with xor. For those who can't find it, this is the string checked with our xored input: 822n But I still don't know where I should detect this xor process. If anyone knows, I hope you can enlighten me as well.
Sems on 4:30 PM 09/04/2022: lol crackmes.one doesn't let me show you the whole key, I guess it's related to anti xss measures :P But if you look a bit more I'm sure you can find it.
Delirium on 9:11 AM 09/12/2022: I don't know why, but the last character was playing up for me. I ended up just brute-forcing it.
1337ReverseEngineer on 5:25 PM 09/16/2022: Glad you guys liked it ;)
1337ReverseEngineer on 5:53 PM 09/16/2022: source code here https://github.com/islaitala/The-Junkrat
Codex231 on 12:56 PM 10/27/2022: Awesome i had fun with this one :D .