| Ternary Trap |
Password: 3ig3nv4lu3 |
2026-03-13 05:06 |
| Nebula |
Through reverse engineering the binary, I discovered the following layers of validation:
1. Anti-Debugging Protection: The program calls IsDebuggerPresent and CheckRemoteDebuggerPresent. If a debugger is detected, it decrypts and prints "Debugger detected" and exits.
2. String Encryption: All critical strings, including prompts and success/error messages, are encrypted using a simple XOR cipher with the key 0x5a.
3. Activation Key Validation:
* Length: The key must be exactly 14 characters long.
* Format: The characters at indices 4 and 9 must be dashes (-), matching the format XXXX-XXXX-XXXX.
* Arithmetic Constraints:
* key[0] ^ key[5] == 0x11 (17)
* key[2] + key[7] == 156 (0x9c)
* 2 * ord(key[10]) == ord(key[1]) + 40
* Checksum Verification: A complex sum of all non-dash characters is calculated using a transformation function f(c, i) (which involves an 8-bit bitwise rotation and addition based
on the character's index). The total sum must equal exactly 1337 (0x539).
The generated key ZZCC-KTYG-A9SU |
2026-03-11 18:32 |
| Silent Lock |
1. Anti-debug bypass: The binary uses IsDebuggerPresent with ud2 traps. Bypassed with dbh (hide debugger) + patching
IsDebuggerPresent to xor eax,eax; ret.
2. String encryption: All UI strings are XOR'd with 0x69 at runtime and wiped after use, so no plaintext in memory.
3. Key validation logic (in sub_1400017C0):
- Handles 3 password lengths: 8, 16, and 27 characters
- Length 16 path XORs input with the constant xmmword_1400CD050 = "PWD!!^-12345-!XD", then SIMD-hashes
- The main function computes an expected hash 0x98D from a constant SIMD formula
4. The secret key: PWD!!^-12345-!XD — the 16-byte XOR key constant itself, stored at xmmword_1400CD050 in the binary's
.rdata section. |
2026-03-10 20:53 |
| find a real key |
checkout my solution https://youtu.be/wFg0uegVP3k |
2022-06-26 10:08 |
| Crackme 01 |
checkout my solution https://www.youtube.com/watch?v=sRVrpeMtrVY |
2022-06-08 15:32 |
| Beginner File CrackMe |
checkout my solution: https://www.youtube.com/watch?v=tweA2sbV8DA |
2022-06-04 02:06 |
| First crackme |
checkout my solution: https://www.youtube.com/watch?v=f8n8BslREo4 |
2022-06-04 02:04 |
| CrackMes 1.0 |
checkout the solution here: https://www.youtube.com/watch?v=wr44Mpotk2c |
2022-05-28 01:51 |