Solved it!
Thank you for providing us with this program!
It was very simple and I would rather give it a lower level.
I haven't seen any obfuscation by the way... just that the password is not in clear in the binary, and that each character (10 of them) is set in a non linear order to compare with user's input.
I made a `crack` program for the exact same platform and posted it in the solutions.
I made a simple crack application that changes a few bytes in the file to always accept any password. I'm gonna post this in the solutions. |
==> |
Note for the site admins: it could be a good idea to sanitize user's inputs inputs. |
==> |
Wow... the \ were eaten by the site. |
==> |
Ok I got it recompiled without the dependencies (that were not even needed).
This command expects 2 parameters:
Usage: ./keygenme
has to be at least 4 characters long and needs to be 25 characters |
==> |
Yes, same thing on my side. It expects a dynamic library: GLIBC 2.29. I'm installing GNU Libc6 to see how it fixes this issue. |
==> |
Well this is way too easy.
The key has just to be a multiple of 1223.
A simple keygen could be:
int key = 1223 * rand(1755914);
But this could be extended to negative values. |
==> |