I've got 2 flags:
'jWu4lSSbBOFRcb4wTK7Tgj14YMiFvvD9QMahKaB2u1I=' with passwords:DbdpOgjTaX,0onlsz1DU7,9MlINGeWBl,KrCcjj3Dws,M1gjXvTQKe
'nHgRku555jrnkhWGFDMceUlOxLzozQK7mAfNCiCTfwI=' with password:gbN4TbS1qt
Am i correct? |
==> |
Nice,
the flag is always false so good or bad password have same rsult.
The skeleton of a keygen:"MD5(username)-(username.length*(0x989676)-8859"
ie:
zobi
TÕÃ;æ#?â\a[¯GK¤\u001Cý-26259D8-8859
|
==> |
You made it!
Lost some time with random stuff inside crackme (shame on me!) :)
password have to be 8 char length minimum with some choosen chars[a,b,d,e,f...],username in the same char array.
Username:aaaa password :aaaa1234 and so on...
|
==> |
And there's an interesting function at 0x401130. |
==> |
Congratz!
Some false positive passwords!,and some clue - length of password (14]
Traps to debugger to bypass,then BP memoryAccess 0x0018B018 ...
sha256 password's:3cbb8351c19d3eb5ce05e805ecfac9d6cf6415c99769e080dc8675f783bd2acf |
==> |
Maybe:c58a1b4077f893ff32f22c18659134f1ee271a823713d718d7cfc6ccdfdd409 (sha256 password's)? |
==> |