| easycrack |
The password is just 'password', but in the program it is stored as a hash :(5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8) |
2026-03-21 20:44 |
| Acid's First Crackme |
secret123
|
2026-03-21 20:17 |
| new crack me by whekkees |
After reversing the algorithm in Ghidra, I confirmed this crackme has no valid solution.
The issue comes from instruction 04 which does: rax_6 += (rax_6 ^ 0x12345678) >> 2
This operation is non-linear and cannot be reversed, making the target value 0x6F3A9B21 unreachable regardless of the password entered. |
2026-03-21 18:08 |
| Challenge #5 |
The program converts your input into binary (8 bits per character) then compares it with a hardcoded binary string stored in data_140004000.
The trick was just to decode that binary string directly — no need to run the program.
Flag: CTF{ASCII-mOre-like_BINASCII!!!} |
2026-03-21 15:29 |
| Bobs gambling |
dzctf(bob_is_free_1337) |
2026-03-21 15:25 |