eadrick0 on 2026-05-21 16:40:
[Click to reveal]flag:igr0t-theking and igr0t
Input the pass:
flag:igr0t-theking
You are good , but...
Say my name...
igr0t
You Win.. (;
liboxin on 2026-05-22 03:45:
@igr0t7 ez by liboxin
==============================================================
Input the pass:
flag:igr0t-theking
You are good , but...
Say my name...
igr0t
You Win.. (;
1."lfkm0cmx:~'~boacdm" every char xor 0xA == flag:igr0t-theking
2.author name == igr0t
then pass the procedure
leizi999 on 2026-05-22 03:51:
[Click to reveal]int main()
{
if (anti_debug())
{
MessageBoxA(..., "Debugger detected! Bye (:", "Anti-Debug", ...);
ExitProcess(0);
}
secret_name = "igr0t";
real_flag = "flag{can-you-crack?}";
hidden_input = "lfkm0cmx:~'~boacdm";
denied_msg = xor_decode("Access Denied...\n", 0x0A);
print_banner();
print("Input the pass:\n");
input = read_line();
transformed = input;
xor_each_byte(transformed, 0x0A);
if (input == "flag{can-you-crack?}")
{
print(denied_msg);
}
else if (transformed == "lfkm0cmx:~'~boacdm") //flag:igr0t-theking
{
print("You are good , but...\n");
print("Say my name...");
name = read_line();
if (name == "igr0t")
print("You Win.. (;");
}
else
{
print(denied_msg);
}
cleanup();
return 0;
}
99ux on 2026-05-22 16:34:
[Click to reveal]Anti-debug uses CreateToolhelp32Snapshot to scan for debugger processes. Patched the jz after the check in main to always skip it.
Login: input is XOR'd with 0x0A and compared. Two paths:
1. "flag{can-you-crack?}" → prints the XOR-decoded "Access Denied...\n" as a success message
2. XOR input with 0xA to get the target -> "lfkm0cmx:~'~boacdm" each char xor 0xA == flag:igr0t-theking
then name == igr0t → "You Win.. (;"
Good intro crackme, thanks Igr0t7!