DEF4L7 on 6:19 PM 05/22/2023: Nice crackme and cool "username" :)
PriceLess on 9:31 AM 05/26/2023: Goota give props to ur username
Muratovez on 2:52 PM 05/26/2023: what is the password of rar file
hateisse on 3:47 PM 05/26/2023: I don't get the reference of the username except sudo :) Also, what is the .zip password ?
hateisse on 5:12 PM 05/26/2023: Alright, found both! I appreciate it was not too complicated as I'm a beginner in assembly. Thanks :D
mythos on 10:09 AM 05/28/2023: Thanks for this encouraging crackme :)
gscalise on 7:53 AM 05/29/2023: Your crackme code is buggy. It will accept any password with two or more characters as long as the first character is the same as the intended one. I'm pretty sure this is not what you intended, and it's quite easy to see why it's happening if you check the disassembly.
mattyl on 1:20 PM 05/29/2023: My first crackme and it was pretty easy :) Thank you
as someone else just stated you just need a 2+ char string with the first letter being 's'
h4ckyou on 5:26 AM 05/30/2023: Great easy challenge!
sudo0x18 on 4:21 AM 06/04/2023: Thank you everyone for appreciating on username :)
As you got sudo in username but 0x18 is hex representation of 24 and which is my birth date :)
blep on 1:39 PM 06/09/2023: Easy one for a beginning, thank you :)
RedVi on 7:15 AM 06/11/2023: sudo0x18
mdenials on 12:56 PM 06/18/2023: sudo0x18 in checkPass function && ss(from 2 to infinity), this is strange
nail_ on 10:17 AM 06/24/2023: Fun and simple :)
GreatCat on 3:55 PM 06/30/2023: Good solution) Good crackme for beginners)
alchimie on 11:18 AM 07/03/2023: Thanks For this easy "Crackme" file,
nice try for me
incon on 9:30 AM 08/01/2023: yeah it's bugged. if you get the first character right, and at some point you get a character wrong in the next 7, it says you got it right. for example, it would say "sudo0x19" is right. if you look at the disassembly and do some poking around with a debugger, it's pretty clear what's happening.
fcyc on 1:31 PM 08/12/2023: This is the first crackme I got through.Thanks!:)
0xf0ad on 4:19 PM 08/21/2023: great crackme but there is a bug, basically any string that starts with 's' and has a length greater than 2 will pass as valid
daggerz on 2:51 PM 09/08/2023: first two letters is "ss" and then can be nothing or any letters
G4170nd3 on 6:00 PM 09/13/2023: Im guessing its not working as intended, please check the disassembly once and fix it.
alen1020 on 4:34 PM 10/01/2023: how can i run the file? managed to get the password but never saw the interface
p4tched on 4:42 PM 10/15/2023: thanks for the crackme! super good and good to learn too
priyaaanshut on 7:16 AM 10/18/2023: Completed
falcon71181 on 11:24 AM 10/22/2023:
char checkPass(char *param_1)
{
char cVar1;
if (*param_1 == 's') {
cVar1 = param_1[1];
if ((((cVar1 == 'u') && (cVar1 = param_1[2], cVar1 == 'd')) &&
(cVar1 = param_1[3], cVar1 == 'o')) &&
(((cVar1 = param_1[4], cVar1 == '0' && (cVar1 = param_1[5], cVar1 == 'x')) &&
((cVar1 = param_1[6], cVar1 == '1' && (cVar1 = param_1[7], cVar1 == '8')))))) {
cVar1 = '\x01';
}
}
else {
cVar1 = '\0';
}
return cVar1;
}
AfkMaster on 7:06 PM 02/04/2024: sudo0x18 is password
nimacpp on 2:58 PM 02/19/2024: nice i love it :)
enerzon on 5:38 AM 04/10/2024: sudo0x18 wasn't the password in my case. in fact there's no need of password. all we need is to rename our binary from level1 to @nima and execute it using ./(bash shell) with the argv[1] = '@'
That's it.
I provided a detailed overview about working of conditions and function in my solution, Go check it out.
it'll help a lot.
Dhiraj on 7:48 AM 06/05/2024: good for beginners