salazans_keygenme_0003 by salazan |
name: knock knock
Serial: 313CA0ABBA2-N1YMg-ULU2c-QPA9t-wLM3D-9EOEs |
light_keygenme by salazan |
name: knock knock
Serial: 313CA0ABBA2-N1YMg-ULU2c-QPA9t-wLM3D-9EOEs |
crackme1 |
name: 137
Serial: 20720920DD02902702 |
kgm1tal by taliesin |
username: hey_its_me
password: EERKCHVYYM |
crackme2 by midi |
username: 00pwn00
serial: 0245068 |
skcrackme_1 by sknine9 |
Username: eazy_beazy
Serial: 196 80 0 40 7 220 196 207 238 10 110 125 216 57 239 67 140 155 77 47 42 68 236 251 |
keygenme_2_by_nicohogtag by nicohogtag |
- This solution script regenerate the username and generate serial key because there is a check on the sum of the username.
If the sum is negative, it will continue; if positive, it will stop.
Here is the check:
004014E5 | | mov dword ptr ss:[ebp-1C],eax |
004014E8 | | cmp dword ptr ss:[ebp-1C],0 |
004014EC | | jns keygen #2 by nicohogtag.4014FD | |
matrice |
I compressed the solution files because it contains memdump |
prime |
We split the secret key into pairs of characters:
Split String: ["11", "3e", "5c", "6e", "ac", "71", "35", "8d", "3a", "47", "27", "63", "9f", "55", "f0", "24", "57", "56", "5a", "e5", "76", "62", "a2", "a2", "72", "76", "10", "d8", "46", "46"]
We perform XOR operations between each pair of characters and the corresponding character from the salt string. The result will be a series of decimal values.
For each decimal value obtained, we brute force the exponent from 0x20 to 0x7e (printable ASCII range). We calculate (129 ^ exponent) % 251 and compare it with the decimal value. When a match is found, we have recovered the original character.
We repeat this process for each decimal value, reconstructing the original password character by character. |