agent_1337 |
After analyzing the program in IDA Pro and making several attempts with the correct values, we arrived at the following input:
```
welcome agent 1337, the evil group 0xL0CCEDC0DE has stolen 1337 BILLION dollars, you MUST get it back...
for your first take you must hack into the admin account
0: enter username, 1: enter password, 2: login 0
enter ur username: AAAA
0: enter username, 1: enter password, 2: login 2
please try again as an admin!
0: enter username, 1: enter password, 2: login 1
enter ur password: root
0: enter username, 1: enter password, 2: login 1
enter ur password: IAMROOT1337
0: enter username, 1: enter password, 2: login 2
stage 1/2 of logging in done...
stage 2/2 of logging in done...
good job agent 1337! you must now use ur secret device to change the code to unlock the door! the current code is ABCD and you must change it!
%.4919d%8$n
....
YOU MADE IT agent 1337 you now have to get the money and escape
wait is someone here?
so mr 1337... you made it into our building... you want this money so bad right?? ok than, say my name and ill give it to you!
what is my name?: stackpointer
you did it... fine i guess you can have the money back
AGENT 1337 YOU DID IT!
```
To determine the flag in the final stage, a Python script was written.
Flag: `stackpointer` |
Password encryption using XOR method |
❯ python3 secret_finder.py sCPZSUPgTG@G^C] CrackmePassword
2025-06-05 09:15:47,666 [INFO] Detected key length: 11
2025-06-05 09:15:47,666 [INFO] Key bytes: 30 31 31 39 38 38 35 37 35 34 33
Secret word (raw): 01198857543
Secret word (escaped): 01198857543 |
TryCrackMe (v1) |
Unpacked the executable:
upx -d Trycrackme1.exe -o TryCrackMe-unpack.exe
Analyzed the algorithm in IDA Pro, focusing on the following functions:
sub_466C74
sub_466CB8
sub_4669AC
sub_466B40
sub_466B64
sub_466A7C
Wrote a serial code generator in Python.
Here's an example of its output:
python serial_gen.py Example
2025-06-02 05:00:01,389 [INFO] Seed initialised to username length: 7
Example → 2P7O-437O-5N54-6R |