saway84122 on 4:36 PM 02/06/2024: def sum_hex_string(string):
# Initialize sum
total_sum = 0
# Iterate over each character in the string
for char in string:
# Convert the character to its hexadecimal representation
hex_value = hex(ord(char))[2:]
# Convert the hexadecimal representation to an integer and add it to the sum
total_sum += int(hex_value, 16)
return hex(total_sum)
# Get user input and store it in a variable
user_input = input("Username :")
if len(user_input) 8:
user_pass = int(sum_hex_string(user_input) , 16) + 10
print(f"Your password is : '{user_pass}'")
else:
print("The length of the string is not greater than 8.")
Clyax on 5:50 AM 02/07/2024: @saway84122 False password / False answer
KingPin on 9:00 PM 02/10/2024: Good challenge for me, as a beginner, very well made and fun to play around!
marci1175 on 6:02 PM 02/11/2024: Im stuck at the code initalization, i dont get what its doing, my friends are telling me its a struct or a class. And *unknown_class = 4222019i64; could be a hash. Any help is appreciated!
sporta778 on 6:58 PM 02/11/2024: later this is assembler, what about u talking, just u need think. just use debugger, here no hard thing , later. What about talking, what is class. Just using username, i think i can solve it
sporta778 on 7:00 PM 02/11/2024: here just some manipulation with username
sporta778 on 12:59 PM 02/13/2024: Just in debugger press f9 3 times, and u will located at EntryPoint of application.
Clyax on 4:01 PM 02/14/2024: @marci1175 Find the main function, and locate the calculation of the password. As mentioned by @sporta778, its a username manipulation.
Mahesh on 2:11 PM 02/16/2024: hey bro.. well im having some problem in cracking a programme called rebelle 7 and i used the 64dbg and i have no idea how to go further.. how do i reverse engeneer the crack when it is asking for username and registered email id.. thanks for helping me out
sporta778 on 7:51 PM 02/16/2024: Mahesh, look like some social engineering?))
cnathansmith on 8:28 PM 02/29/2024: @Mahesh download and read every book with "Reverse Engineering" in the title cover to cover and then be prepared to put in a lot of hours, research, and frustration working on it. It's very doable in most cases, it's just a lot more complicated.
Phaazes on 7:38 PM 04/03/2024: I found the password generator and realized what it was doing.
I had great frustration to find a good debugger where I could see registers value to find out the password ans what was wrong with my method.
Otherwise very fun, I learned a lot!