GG_Y0u_ar3_th3_g0at,(you will see a swapping function based on the seed value obatained from srand(param),so like i copied function and made it so it prints the i and j values the positions which are being swapped then i made a script to unswap and it gave this :) |
==> |
main-verify-alphaverify and in alpha verify u see each of the 20 input charecters is being loaded into 20 diff variables and these variables are being compared to see if they fall in specified range like greater than 'N' and less than 'B' and if the value satisfy the condition it prints not correct if it doesnt prints correct.one key is :BEHDNUAGILFCPSRFODHF |
==> |
@Ja48s28Ck it haves the number of arguments becaus in the _start function,the func which calls the main along with the arguments does a right shift by 1 on the first parameter which is basically dividing by 2,the first parameter holds the value of number of arguments entered |
==> |
Nice one learned somet i didnt know |
==> |
|
==> |
so in _start u can see the param's thats being passed to main is under going 1(so if x its passed as x/2) so when u pass ./argc x x,u are correct but not correct as in main the first param is being compared to 3(param_1==3) so,u either have to patch so param_1 == 1 or remove the 1.hope it helps :) |
==> |
pass:verysecret69 |
==> |
please compile using gcc,so everyone can use it. |
==> |
Boozy-A46EC6FA53551E6C14C4835B324AC3889864AF08D0919FD6A7FA1A453379A149-OMGWTFBBQ |
==> |
its not painful,u just need to be not havin lot of free time
|
==> |
e4444,used debugger and was close to my input text. |
==> |
ThisPasswordIsRandomAsFuck |
==> |
@starboi zip password is crackmes.one,its same for all the crackmes in the crackmes.one site |
==> |
nope password is not .rdata |
==> |