MichaelBrown on 2023-04-25 10:39:
[Click to reveal]Was the key "fdooFPOkfpO[90PFJIKpofj9[O0PFJ[OPjkfopj[OPFJ[pfjOPJFOPjfopJFPOjfopk]FolpjfoFjfo p[lJKFOPjfpKFLK;jofjKOLP'FJKLjfklFJKf"?
sorry it just instantly closes so im not sure?
Ch4daev on 2023-04-25 11:52:
[Click to reveal]nice key bro:)
fdooFPOkfpO[90PFJIKpofj9[O0PFJ[OPjkfopj[OPFJ[pfjOPJFOPjfopJFPOjfo
OnlyPrinzP on 2023-04-25 20:55:
[Click to reveal]Key is:
fdooFPOkfpO[90PFJIKpofj9[O0PFJ[OPjkfopj[OPFJ[pfjOPJFOPjfopJFPOjfopk]FolpjfoFjfop[lJKFOPjfpKFLK;jofjKOLP'FJKLjfklFJKf
pstrelnikov on 2023-04-29 16:46:
This one was unintentionally very instructive. I was reversing using Ghidra when I found the key in the code but couldn't get it to work from the command prompt.
The problem was that Ghidra subtly changed the string in the list of strings -- it "escaped" the single quote with a backslash when it displayed it:
fdooFPOkfpO[90PFJIKpofj9[O0PFJ[OPjkfopj[OPFJ[pfjOPJFOPjfopJFPOjfopk]FolpjfoFjfop[lJKFOPjfpKFLK;jofjKOLP\'FJKLjfklFJKf
Thanks to OnlyPrinzP for showing the actual working key: a quick DIFF between it and my Ghidra-copied-string showed the difference, and I learned something new about Ghidra as well in the process.
fedegaza1 on 2023-05-02 01:09:
How does one crack the program in order to escape the check? already tried several changes on jne to jmo, but I see it calls an external module for the comparison.
BeginnerCracker123 on 2023-05-07 09:02:
Yea it was actually easy. It took me like 15 seconds. I did a KeyGen.
minixreal on 2023-06-14 09:11:
[Click to reveal]I used HxD and found correct key string
fdooFPOkfpO[90PFJIKpofj9[O0PFJ[OPjkfopj[OPFJ[pfjOPJFOPjfopJFPOjfopk]FolpjfoFjfop[lJKFOPjfpKFLK;jofjKOLP'FJKLjfklFJKf
minixreal on 2023-06-14 09:13:
+ i cant use this program in x64dbg
muniategui on 2023-08-25 11:22:
fedegaza1 the external module is memcmp. You have to patch .text:00007FF798ED130C jnz with 2 nop. That will make the comparison work for any length. Then you have to patch .text:0000000140001323 with jmp to make it always jump to the cout instead of making the check of the memcmp result. Also, you could patch eax.
fortmea on 2024-01-11 15:47:
[Click to reveal]Very easy. Key: fdooFPOkfpO[90PFJIKpofj9[O0PFJ[OPjkfopj[OPFJ[pfjOPJFOPjfopJFPOjfopk]FolpjfoFjfop[lJKFOPjfpKFLK;jofjKOLP'FJKLjfklFJKf