dj999 on 2023-07-07 15:22:
[Click to reveal]Very weird password indeed
""
yes this string is the password
dj999 on 2023-07-07 15:23:
Cant even post the password in here it contains those characters
interrrp on 2023-07-11 03:42:
xor "encrypted", key is "goodjob" and figure out password yourself
interrrp on 2023-07-11 03:50:
[Click to reveal]nvm
XOR encryption key is "klapklapxxx" and run through "goodjob", it's ""
funn1 on 2023-08-21 21:27:
This is a very simple crackmi. Those who do not understand how to solve it, I will help. We all understand that if we run the program and enter the wrong password, an error will come out, as a beginner, I immediately started looking for this error in the IDA PRO disassembler, After searching, I found this error and immediately saw in the graphical window this construction jnz short loc_401771 - This design had 2 direction vectors. 1 - Correct, 2 - Incorrect. But behind it was the construction test eax,eax, which means "test eax, eax" is used to check the eax register. If the value of eax is zero, then the Zero Flag (ZF) is set to 1, otherwise it is set to 0. This allows the program to make a decision or make a transition based on the value of the Zero Flag (ZF). If we see such a construction where there is a short, then it consists of two bytes 0 is not true, 1 is true. Initially, I knew that jnz was a conditional transition, so I immediately put breakpoint on this instruction and started the debugger, entered the password for the rand
aname on 2023-08-25 06:41:
real anti-crack method in this file is bad password
Pupsik on 2024-11-11 14:55:
so ezzz need 30 sec t0 crack