Wow! It was wonderful! (Peanut butter...).
I've delved to this crack and completely figured it out. But I need a hit about SMBIOS. Help me please: I should patch SMBIOS manually or correct value should be there initially?
Please for this task. It was interesting and informative! |
==> |
There are a lot of correct keys. Nice crackme! Thank you! |
==> |
I figured it out! I am delighted! Simple but interesting! Thank you! |
==> |
Help me please understand what's going on. I found the key, it was not very difficult: there is value (that calculate in program) and user key xor 0x1122..2211 ...
I realize it.
But I think I miss something important detail. I can't realize why crackme's name is "Metamorphic"...
Help me please with this snag. |
==> |
Thank you for this crackme! Using of anti-debugging function is very cool! But I don't think, that is 4 level of difficulty, as verification algorithm is not so hard.
Anyway, thank you again for this nice crackme!) |
==> |
Thank you for that exciting crackme!
I agree with @nightxyz. I have some questions about this task. Help me please find the answer: are 32-bit instructions used together with 64-bit ones?
I think there are (as minimum) 2 such instruction: inc edx (0x42) and inc esi (0x46) in function with checking password validation.
Provide please a link to materials on this topic. |
==> |
Exciting and enjoyable crackme! But I don't write keygen for it, and find the valid key (one of many) manually!
Thank you for this challenge!
|
==> |
Dojas, can you give me some advice on how to solve this problem? I sat for four days but never found what it could be...
It seems that this task is not a crackme at all. |
==> |
Dojas, please tell me if this is correct or there is something wrong with it. |
==> |
hurvajz, can you solve it? |
==> |
The password is string "thatflagissus3" |
==> |
Great crackme! Can I write password here? |
==> |
Wow! Сool crackme in C++ for beginners. Thank you! |
==> |