Why u share it O.o kinda easy
Username: admin
Password: P@ssw0rd |
==> |
In main (0x1400025e0) gets input and does many random math with that. But thats all fully fake..
This every math step goes to validate func (0x140001740). This func calcs a value with that but just not using them when send to 0x140003410 O.o
Calls another func (0x140003fe0) and this func creates static str of all "1" NOT FROM USER INPUT.
After all 0x140001740 funcs compare static str with "1111.." with static str "11001011001010101010100110101000110111010010100101011".
This isnt CrackMe, just troll. |
==> |
In first look many ppl things flag is "Flag: %s" but its not.
There is another flag bait: 0x401462 does xor "true"/"eurt" without debugger.
Real flag is: 0x40125c dies cmp for dword_40541c(dynamic_value)/dword_40542c(static_value).
Patch: 0x401256 - mov ecx, dword_40542c (cuz thats static) |
==> |
Thats funny to look but i dont think is 5 diff. Key is not static cuz uses PC infos (GetVolumeInformationA + Win32_ComputerSystemProduct).
In first check i just lazy to analyze hash algoritm and i just did byte patches patch. [0x14004553D: 0F 85 41 03 00 00 - E9 C3 02 00 00 90]
But after few mins, i figured hash is very simple actually [i ^ (131 * final_hash)], then i just write keygen too. |
==> |