bp 00007FF71F3F1513
dump rbp-39
admin
12345 |
==> |
bp 00007FF779E71515
dump rbp-69
admin
password |
==> |
Sorry:
CTF-11060565,CTF-53729365,CTF-96398165 |
==> |
CTF-11060565,CTF-12767317,CTF-14474069,CTF-16180821,CTF-17887573,CTF-19594325,CTF-21301077,CTF-23007829,CTF-24714581,CTF-26421333,CTF-28128085,CTF-29834837,CTF-31541589,CTF-33248341,CTF-34955093,CTF-36661845,CTF-38368597,CTF-40075349,CTF-41782101,CTF-43488853,CTF-45195605,CTF-46902357,CTF-48609109,CTF-50315861,CTF-52022613,CTF-53729365,CTF-55436117,CTF-57142869,
CTF-58849621,CTF-60556373,CTF-62263125,CTF-63969877,CTF-65676629,CTF-67383381,CTF-69090133,CTF-70796885,CTF-72503637,CTF-74210389,CTF-75917141,CTF-77623893,CTF-79330645,CTF-81037397,CTF-82744149,CTF-84450901,CTF-86157653,CTF-87864405,CTF-89571157,CTF-91277909,CTF-92984661,CTF-94691413,CTF-96398165,CTF-98104917,CTF-99811669 |
==> |
makepass
00007FF7B45015B3 in R15 |
==> |
KIWZ
00007FF7D88316E1 in RDX |
==> |
0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
100 x '0'
CrackMe is with source code and solution |
==> |
This is not easy. Virtual machine protect, anti ScyllaHide. CrackMe not running on VM. |
==> |
hello is very easy
on address 00007FF72B5F12C5 in RSI |
==> |
VmFsaWRQYXNzd29yZA==
in RDX on address 00007FF64B5A1703
Base64Decode - ValidPassword |
==> |
QuiteEasyRight
Sorry, text of previous messages is long. |
==> |
00007FF7D99B13BA | 48:8D5424 40 | lea rdx,qword ptr ss:[rsp+40] | |
==> |
00007FF7D99B13AF | 4C:8B4424 30 | mov r8,qword ptr ss:[rsp+30] |
00007FF7D99B13B4 | 49:83F8 0E | cmp r8,E | | |
==> |
https://github.com/brechtsanders/winlibs_mingw/releases/download/15.1.0posix-12.0.0-msvcrt-r1/winlibs-x86_64-posix-seh-gcc-15.1.0-mingw-w64msvcrt-12.0.0-r1.7z
copy library from bin folder in archive to folder with crackme
libgcc_s_seh-1.dll
libstdc++-6.dll
Password: ThisIsNotThePassword! |
==> |
Password: Boozy
B - 0x66
o - 0x111
o - 0x111
z - 0x122
y - 0x121
0x111 * 0x66 = 0x1c9e
0x111 * 0x111 = 0x3021
0x122 / 0x121 = 1
0x122 % 0x121 = 1
0x111 - 0x64 = 0x11
0x11 * 0x11 = 0x121 |
==> |
Patch one or two bytes, show flag
00001262:75-74
or
00001262:75-90
00001263:28-90 |
==> |
Name: Danko
Password: 2465 |
==> |
username: Danko1
license key: 000080550 |
==> |