ilkiNUR on 9:10 AM 11/07/2025: [*] Enter password (or type 'about'): CR4CK_TH15_M3G4_H4RD_2024!
===============================================
[SUCCESS] Access Granted!
Flag: FLAG{U_CR4CK3D_TH3_ULT1M4TE_CH4LL3NG3}
Congratulations, elite hacker!
===============================================
ilkiNUR on 9:11 AM 11/07/2025: you use any xor process in GetPassword function but don't use them in real password ;)
Bobx on 10:08 AM 11/08/2025: thanks for using the bug to correct it
PL45M4 on 4:15 PM 11/08/2025: As ilkiNUR stated, the correct password is in plaintext which made trying to circumvent the anti-debugging checks unnecessary.
Here's my writeup: https://bobbyhillreverseengineering.blogspot.com/2025/11/crackme-bobxs-very-hard-antidebug-10.html
Thank you for the challenge.
Lilsan44444 on 7:05 PM 11/08/2025: At virtual address 00007FF65E3021DF the string 00000000005FFBC0 43 52 34 43 4B 5F 54 48 31 35 5F 4D 33 47 34 5F CR4CK_TH15_M3G4_
00000000005FFBD0 48 34 52 44 5F 32 30 32 34 21 00 04 00 00 00 00 H4RD_2024!......
is loaded onto the stack
easy as sus
Bobx on 12:33 AM 11/09/2025: Okay, I'm preparing version v2, which is not so easy anymore
OmarDecryptX on 6:13 PM 11/10/2025:
Literally in the Strings references of x64dbg
Address=00007FF6EF352581
Disassembly=lea rax,qword ptr ds:[7FF6EF3553E8]
String Address=00007FF6EF3553E8
String=" Flag: FLAG{U_CR4CK3D_TH3_ULT1M4TE_CH4LL3NG3}"
You must be logged in to submit a writeup
Write a comment
Share how awesome the crack me was or where you struggle to finish it! Stay polite and do not spoil the solution/flag!
Rate the difficulty
How would you rate the difficulty of this crackme ?