| CrackMe By ZenithSouu |
lol this guide was written by chatgpt. "OMEGA Mode" "The Bloodhound" "Maximum Security Engaged 🦾⚡" bro come on
password is UUUOPSQ784
didnt set up a VM, not doing that for this. just pulled the binary apart statically. pdata_c is not encrypted on disk, the guide is lying, entropy on that section is 5.54 and the first bytes are a textbook msvc prologue. the password is 11 bytes xor'd with one hardcoded 64bit key written into TLS. read the key, xor the bytes, done.
the "bsod trigger via cr0" is literally two instructions. mov rax cr0 then mov cr0 rax. patched in like 30 seconds. the process explosion is a few CreateProcessA calls, also patched. none of it is impressive when you can just scan the binary for the call sites.
if you actually made this yourself strip it next time at least
- HeapLeaker
|
2026-04-07 06:07 |
| I need to be honest |
password is SecurePass_2k26_X64_Reverse
raw syscall ELF, not stripped, password sitting in plaintext at 0x4011a3. just a byte by byte compare loop then a checksum check (sum has to be 0x9be). both trivial to spot in one objdump pass.
3 flags are single byte xor blobs, keys are 0x47 0x5a and 0x6c loaded into eax before each decrypt call at 0x4002a9
flag1: CRYPTO_KEY_ALPHA_2026
flag2: REVERSE_ENGINEERING_CHALLENGE
flag3: MEMORY_HIDDEN_GAMMA_X64
good crackme for beginners, solved on linux
- HeapLeaker
|
2026-04-07 05:36 |