The password is hardcoded. It is split into two parts in memory,
V2VsbCBkb25lISBUaGlzIGFwcGxpY2F0aW9uIHdhcyB3cml0dGVuIGluIHB1cmUgQ and ywgYW5kIHlvdSBjcmFja2VkIGl0Lg==. Once you combine them you get the actual password, which is V2VsbCBkb25lISBUaGlzIGFwcGxpY2F0aW9uIHdhcyB3cml0dGVuIGluIHB1cmUgQywgYW5kIHlvdSBjcmFja2VkIGl0Lg==. It is a base64 string. "Well done! This application was written in pure C, and you cracked it." |
==> |
Look for unicode strings and this mouthful pops up:
VcsE~oHYo7&f.CCJ)dU1pwRJ&FXu{pq~TL4XbFKTqW7I)UZL9r
Great for beginners! |
==> |
1ecc7dd7b9763028e119e5046268d922 |
==> |
answer is '?'. if you look at the pseudocode in ida you see that it checks if the input is equal to 63(ascii) which is '?' |
==> |
flag is ACTF{N01ce_R3v3r51^g} |
==> |
user: kutch
password: 2172
i enjoyed this one very much. I'm usually not very good at writing keygens based on c++ decompiled output, but I managed to do great with this one. Super satisfying! Thank you and keep it up. |
==> |
the password is 123214456 |
==> |
Because there is no seed provided for the random number generation, the number is always the same. You can easily just write a script which gets two random numbers modulos 10000 + 1 and adds them together and there you have the result. |
==> |
Username: bonk, Password: bonk@fsociety |
==> |
the credentials are - Username: YourACoolHackerman, Password: CrackMeByMiraii |
==> |
the key is HTD4R-HF3H7-H2F5G-H9V5D-H9J3G-H5F6H-H7G4F |
==> |
the key is VGhpcyBpcyB0aGUgY29ycmVjdCBwYXNza2V5LCB3ZWxsIGRvbmUh |
==> |