| sumhex's keygen me |
GautamGreat
40F7715CA1ED47726561
crackmes.one
64989B8FA31D85B3AE6F6E
https://pastebin.com/BzXmApH8
|
2023-04-23 09:46 |
| sumhex's keygen me |
I love working with Delphi compiled binaries.
Here I reversed the algo which is used to generate keys.
Written in Python3
import struct
import sys
def key_generator(name: str):
name = name.encode() # convert to bytes
const = 0x07FC
result = ""
for i in range(0, len(name) - 2): # need only first 4
ch = (const 8) ^ name[i]
result += "%02X" % ch
const = ((((ch * const) * 0xD201) & 0xFFFFFFFF) * 0x7F6A) & 0xFFFF
result += "%02X" % name[-2]
return result
if len(sys.argv) == 1:
print("Usage: Keygen.py ")
else:
print(key_generator(sys.argv[1])) |
2023-04-23 09:42 |
| Simple VM v1 |
I'm able to get flag just by debugging.
flag{ThIs_vM_1s_n0t_EfF1ci4nT} |
2020-11-23 10:34 |
| Find the Flag |
I think i over complicated things ;p
flag{vbScr1pt!_1s_n0t_s0_b4d?} |
2020-05-29 06:44 |
| Find the Flag |
flag{y0_b0y_y0u_g0t_l0st!_aga1n??} |
2020-05-26 08:38 |
| GautamGreat's KeygenMe #3 |
I packed it with a old upx, may e that is the problem.
There is nothing harmful in binary pure compiled with msvs 2013. |
2019-10-19 16:52 |
| lexXxus crackme 1.1 |
Level should be 2
data = [0x00001351, 0x0000135B, 0x00001356, 0x00001350, 0x0000134C, 0x0000137F, 0x00001303, 0x00001341, 0x00001304, 0x00001368, 0x00001303, 0x00001368, 0x00001359, 0x00001306, 0x00001354, 0x00001304, 0x00001368, 0x00001345, 0x00001304, 0x00001341, 0x00001304, 0x00001345, 0x00001344, 0x00001306, 0x00001359, 0x00001350, 0x00001368, 0x00001340, 0x00001303, 0x0000136E, 0x0000134A]
flag = ""
for i in data:
flag += chr(i ^ 0x1337)
print flag |
2019-10-03 13:05 |
| Quick Crypto, 18k |
it reminds me a ctf challenge
p**_ad*******_so****** |
2019-06-21 04:00 |
| GautamGreat |
Nevermine I was trying it on python2, It is working pretty fast on Python3 |
2019-06-15 08:19 |
| GautamGreat |
Hi,
@321test123, Thanks for testing my keygen me challenge. You were right there was a little bug in code of addition and multiplication. You keygen took so much time to generate keys, which is kinda unacceptable.
|
2019-06-14 11:38 |
| Crack Me - Password Hash(fixed) |
I can't run it on my Windows7 x86 machine. |
2019-04-02 14:42 |
| Input Magic |
I dunno why but it crash in Windows 7 x86 |
2019-03-29 12:33 |
| Crackme |
An awesome crackme challenge :D
I'm not spoiling the fun of others so here is MD5 hash of password
Password MD5 hash is E05E2327A8CEADA096724AFC802BBF7E |
2019-03-01 13:44 |
| Crackme 4 by @rextco |
After little math I got a password it shows a message box but it seems encrypted.
one of the password is :
0148726828 |
2019-02-20 09:26 |
| GautamGreat |
I don't know the difficulty, admins should decide it. |
2019-01-26 10:12 |
| GautamGreat |
Seems problem with x32dbg, Use ollydbg instead, it is more stable. |
2019-01-24 09:43 |
| GautamGreat |
Which debugger are you using? |
2019-01-22 10:36 |
| GautamGreat |
The algo is perfectly reversable. Here is working key sets.
Name : GautamGreat
Key1 : UIKZK-Y6LN7-KMCKA-DPW7N-XTLQZ
Key2 : VQJZC-N4AX8-8E4QI-3BBEL-M2ZP6 |
2019-01-21 12:52 |