Incredibly good CrackMe, I learned lots of stuff, and also had to use more tools because Ghidra had trouble decompiling this in a way that it's easy to understand. I ended up just patching it, but I also came close to cracking the password by checking all the conditions for the checks to succeed. |
==> |
Not gonna lie, without patching this was harder than what it should be mostly because I'm stupid. The passphrase is *almost hardcoded*, and the only thing needed is some basic understanding of how Golang manages **little-endian/big-endian** encoded strings by default ;) |
==> |
overall pretty easy, I like that there are LOTS of possible solutions for this crackme. maybe I'll try it again soon |
==> |
Very easy, the passphrase is *almost* hardcoded, just a small conversion and we are good to go. |
==> |
incredibly easy, just opened Ghidra, analyzed, and immediately got the answer in the decompiled version of the main function. passphrase is hardcoded |
==> |
pretty good crackme, also very simple |
==> |
Pretty nice Crackme for beginners that just installed Ghidra like me. Would like to try again but instead of patching the code trying to reverse the hashed password, maybe John The Ripper with a small custom script could work for brute-force. |
==> |