Here's a new pin + other ways to solve it. |
==> |
If you have any questions, you can write me on Discord)) In Discord I have the same nickname. |
==> |
1) All instructions are almost identical. Most of the difference is one opcode, which they just emulate. So just rename most methods according to it. Yeah, about 20 opcodes are int-long conversion, float-long etc, ignore them, in new versions I reduced it.
2) You probably have the right part of translated methods, it's time to put the right breakpoint in dnspy and trace the logic. Hint where to put the bryakpointe (flip the screen, don't want to spoiler): ˙poɥʇǝɯ ǝuo ʎןuo sı ǝɹǝɥʇ ǝɹǝɥʍ ǝʇɐƃǝןǝp ɐ uı. IGNORE MAIN and START, it just initializes TerminalGUI there. It's scary. Don't try to trace it.
3) Check a number with a number a couple of times (so you can't get a pin easily, heh), just find which numbers and pick up a pin. |
==> |
For Bang1338 - try copy UnrealEncrypt code and reverse Replace arguments. For "тумукпщттфьфлунщгскн" I got "nevergonnamakeyoucry" and its the correct pass |
==> |
I think the password is - DoYouSeeWhatISee?
But the crackie won't accept it |
==> |
It's impossible to crack. You check the text from the BUTTON with a password, but you need to check the text from the TEXTBOX with a password...
/del |
==> |
The text is very poorly hidden, including the code that decrypts the text. A couple of minutes with dnspy and the login is found. |
==> |
I guess I'm late...
1) In dnspy you can see il code
2) Run crackme, then attach dnspy and set a breakpoint to string.op_Ineqauilty. Then brute a password and compare with the arguments from the breakpoint. 3-6 attempts and you have a sample password with which you will see YOU WIN |
==> |