revan.flp on 2026-04-08 14:04:
You just need to add a JMP instruction to 0x00007FF73020140D after you’re prompted to log in
Narato on 2026-04-09 01:50:
[Click to reveal]Total newbie at cracking, but it was actually pretty fast, only took 3 to 5 hours lol.
Login: whekkes
Password: qwerty
ElmirShagiev on 2026-04-12 16:47:
[Click to reveal]whekkes:qwerty
DevVolodya on 2026-04-12 18:54:
[Click to reveal]1. Original Credentials
By analyzing the source code (decompiled C++), we identified the hardcoded strings used for validation:
Original Login: whekkes
Original Password: qwerty
2. The Logic
The program protected the "success" message using two layers of checks for both the login and the password:
Length Check: It compares the length of your input with the hardcoded string length.
Content Check: It uses memcmp to verify if the actual characters match.
If either check fails, the program executes a conditional jump (jnz — Jump if Not Zero) to a failure block, skipping the success message.
3. The Crack Methodology
To "crack" the binary, we modified its assembly logic to make the checks irrelevant:
Identify the Jumps: We located the jnz instructions following the cmp (length) and test (memcmp result) operations.
NOP Patching: We replaced these jump instructions with NOP (0x90 — No Operation). This forces the CPU to ignore the "failure" path and proceed directly to the next instruction.
Automation: We used an IDC script to automatically scan the main function and neutralize every conditional jump, effectively removing all security barriers at once.
4. Final Result
By applying these patches to the .exe file, the program now accepts any login and any password, immediately displaying the message: Nice job bro.
notserpishere on 2026-04-26 09:47:
took me just one decompilation xD