Here you have my static analysis made with Ghidra.
https://github.com/gabimarti/crackmes-solutions/blob/master/crackmes.one/TheReverser-Find_password/b1h0-TheReverser-Find_password.md |
==> |
Here is my static analysis with Ghidra and the keygen source code.
https://github.com/gabimarti/crackmes-solutions/blob/master/crackmes.one/BinaryNewbie-Small_Keygenme/b1h0-BinaryNewbie-Small_Keygenme.md |
==> |
Here is my solution to the crackme analyzed statically with Ghidra. I also posted the solution on crackmes.one
https://github.com/gabimarti/crackmes-solutions/blob/master/crackmes.one/oguzbey-Lucky_Numbers/b1h0-oguzbey-Lucky_Numbers.md |
==> |
About a week ago I sent my solution. But since I see that it does not appear, I leave here the link of my GitHub repository where I have also left it.
https://github.com/gabimarti/crackmes-solutions/blob/master/crackmes.one/Shad3-Keyg3n_M1/b1h0-Shad3-Keyg3n_M1.md |
==> |
Only works VIP Codes for user joe and monkey.
The function that really matters to us. The one that decrypts the VIP Code. It is in the address **00401CF0**.
Just put a breakpoint at address **00401D67** and check that it is what is loaded into the **EAX** register that contains the memory address where the **VIP CODE** is.
My solution in Github.
https://github.com/gabimarti/crackmes-solutions/tree/master/crackmes.one/toaster-VIP_access_me |
==> |
I see that my solution is published, but as I accompanied it with images it is perhaps not very clear. If someone is interested in seeing the whole process I have it published on Github.
https://github.com/gabimarti/crackmes-solutions/blob/master/crackmes.one/evilprogrammer-mexican/b1h0-evilprogrammer-mexican.md |
==> |
Finding the flag is easy. Many people have already put it here. But it is best to patch it to see that the flag is displayed. I just uploaded my solution (the first in this reversing). Even so, I think there is an error, because the flag does not write a \ 0 at the end of the string and a memory leak appears. |
==> |