1) username len greater than 8
2) username len smaller than 8 and greater than 1 |
==> |
two conditions to get correct password:
1) username len 8, then password is "Mr."+username
2) username len 1 then password is username+"@fsociety" |
==> |
the strings are not in english 🙄 |
==> |
Just have to find the logic in the decompiled code, then it's easy. idk why people are sharing answers in comments ughh. |
==> |
ok, I just copied the wrong base64, that's why I didn't get the password. Now everything okay. |
==> |
why is there a powershell script encoded in base64 string inside an executable written in C# ? xD
Found the flag, but is the password in base64 wrong ? Because it didn't work for me. |
==> |
for everyone who can't unzip the zip file .
The password for the zip file is : crackmes.one
Btw this is very easy, no need for key gen, patch is ez.
just change jn to jnz after cmp instruction lol |
==> |
took you 5 mins to make.
took me 5 mins to get username and password.
I initially used dotPeek, all I got was some bmp images lol, then loaded up in IDA and found the values. |
==> |
Can we patch ? |
==> |
19082004
It was in hex , so need to convert to base 10 then try to enter the password. |
==> |
An easy crackme for people who are getting into reverse engineering newly like me. |
==> |