| good for learning |
10:48 AM 03/08/2022 |
==> |
| impossible wow.. |
5:05 AM 02/17/2022 |
==> |
| ono |
1:29 PM 02/07/2022 |
==> |
| 416 == str[0] + str[1] + str[2] + str[3] |
10:19 AM 02/03/2022 |
==> |
| SDLKJFOPEI**************** |
5:14 AM 02/03/2022 |
==> |
| 1. Write how to disable all the anti-debugging functions
StartAddress
sub_401AA0
sub_401BA0
bypass all
then done with ce windbg |
4:08 AM 02/03/2022 |
==> |
| check hashed input with sha256 and data.
cant find rt
System.Windows.Form.MessageBox::Show |
6:54 AM 02/01/2022 |
==> |
| if (this.richTextBox_0.Text == Form0.getString_0(107396704))
{
MessageBox.Show(Form0.getString_0(107396675));
MessageBox.Show(Form0.getString_0(107397090));
debug and get strings:
RASBERRYONTO********
SG9sbHkgU2hpdC************************** (base64 encoded data)
decoded:
Holly Shit! You did it! DM ME ON ***************
|
1:48 AM 01/29/2022 |
==> |
| 1min crack |
1:39 AM 01/29/2022 |
==> |
| dump and see how it make pw.
pw = pw + ((int)id[i]).toString() |
1:33 AM 01/29/2022 |
==> |
| dump and two goals complete
encrypt:
key = random(100000,1000000)
value = (value + key) * -1
press -:
encrypt ( enc_health.decrypt() - 5 )
press +:
encrypt ( enc_health.decrypt() + 5 )
isBeingDebugged:
exit()
getModuleHandle("vehdebug-x86_64.dll"):
exit()
HasAllowedHost():
exit()
blabla |
11:43 PM 01/28/2022 |
==> |
| was very ez |
1:30 AM 01/27/2022 |
==> |
| easy base64 str |
8:54 AM 01/26/2022 |
==> |
| gg |
6:53 PM 01/25/2022 |
==> |
| gg |
6:43 PM 01/25/2022 |
==> |
| gg |
6:36 PM 01/25/2022 |
==> |