| decode me |
Used x64dbg to analyze the main function, bypass a simple IsDebuggerPresent anti-debug check, and follow the calls that read, encode, and compare the user input. The program converts each character to a \xHH form using the format string "\\x%02X" and compares against a stored constant, revealing the correct password. |
| Ez Crackme |
Simple .NET console crackme. I used dnSpy to inspect Main, where the program compares Console.ReadLine() directly against a hard-coded string. The correct password is stored in plaintext, so no encoding or transformation was involved. |
| simple crackme |
A few months ago I decided to delve into the land of RE. This weekend I decided to put my big boi pants on, take what I've learned thus far, and endure the challenge of my first CTF.
Any constructive criticism on the writeup/solution, different approaches, and/or what I could have done better/differently would be greatly appreciated as I am still a scrub and have plenty to learn. :) |