ilkiNUR on 2025-11-07 09:10:
[Click to reveal][*] Enter password (or type 'about'): CR4CK_TH15_M3G4_H4RD_2024!
===============================================
[SUCCESS] Access Granted!
Flag: FLAG{U_CR4CK3D_TH3_ULT1M4TE_CH4LL3NG3}
Congratulations, elite hacker!
===============================================
ilkiNUR on 2025-11-07 09:11:
you use any xor process in GetPassword function but don't use them in real password ;)
Bobx on 2025-11-08 10:08:
thanks for using the bug to correct it
PL45M4 on 2025-11-08 16:15:
As ilkiNUR stated, the correct password is in plaintext which made trying to circumvent the anti-debugging checks unnecessary.
Here's my writeup: https://bobbyhillreverseengineering.blogspot.com/2025/11/crackme-bobxs-very-hard-antidebug-10.html
Thank you for the challenge.
Lilsan44444 on 2025-11-08 19:05:
[Click to reveal]At virtual address 00007FF65E3021DF the string 00000000005FFBC0 43 52 34 43 4B 5F 54 48 31 35 5F 4D 33 47 34 5F CR4CK_TH15_M3G4_
00000000005FFBD0 48 34 52 44 5F 32 30 32 34 21 00 04 00 00 00 00 H4RD_2024!......
is loaded onto the stack
easy as sus
Bobx on 2025-11-09 00:33:
Okay, I'm preparing version v2, which is not so easy anymore
OmarDecryptX on 2025-11-10 18:13:
[Click to reveal]
Literally in the Strings references of x64dbg
Address=00007FF6EF352581
Disassembly=lea rax,qword ptr ds:[7FF6EF3553E8]
String Address=00007FF6EF3553E8
String=" Flag: FLAG{U_CR4CK3D_TH3_ULT1M4TE_CH4LL3NG3}"
pavler on 2025-11-12 14:45:
Bro next time u should compile it in release mode not debug if you want make it harder.