@schuemi im going to fix this crap made by me |
==> |
Do you find the algorithm? @nigthxyz |
==> |
ops bug my bad xD |
==> |
congratulation to timotei, he made a keygen in pure asm |
==> |
DONE! key in the solution file :D |
==> |
This is a good challenge for me, this program its going to self modifying its own code, next day i study in the deep this crackme! :D |
==> |
PasE[0x10,0x4]!23 |
==> |
the crackme is not written in asm, but in vb6, visual basic use wide char string PasE maybe is the first part of the password and !23 is the last i think anyway the string is this PasE!23
but is not working becouse the string contain 9 characters insted of 8 |
==> |
https://youtu.be/-1SbvR2n8DI patching done :D
curious about the password... |
==> |
@byclone, good but 3rd rule is write a keygen... :D |
==> |
@byclone nice! you probably found the algorithm, now its time to write a keygen! :D |
==> |
Read the FAQ, anyway in this site you can download a zip file protected with a password,
the password is "crackmes.one" or if the crackme is imported by the old site "crackmes.de" the password is "crackmes.de" |
==> |
cant run the program. |
==> |
Here you find my keygen + source code + text file to explain every steps i made.
https://we.tl/t-gT5Wt5Y5Jo |
==> |
i know, in fact i made a keygen in C. but i still waiting for approval. |
==> |
I wait for my solution to be accepted 4 days ago :( |
==> |
anyway i write a keygen, an code injector to make a self-keygen and a text file when i explain every steps i made to do this. |
==> |
DONE! |
==> |
i know in some part of section there is a string reference an "ASM GUARD", but i dont find anything about that |
==> |
the PE files, are encripted, i see this sections
.SCY
.___rR_
.bb_bb
.keygen_this_dump_SCY
yes, maybe i wrongly unpack :( |
==> |
this keygen me is so hard cuz the encription is "custom",
i dont know much how to unpack a program.
i try to unpack with UPX -d but this keygenme was packed with a modified UPX packer, i dont know much about this.
then i try to unpack manually and i done!
but something was wrong and when i open the unpacked .exe the GUI show up and disappers immediatelly.
any tips? |
==> |
curious about the lazarus project.
im new on object pascal. |
==> |
3 encryptions level? omg maybe you want me turn a non-dead
|
==> |
i'm stuck in this keygen me, this is what i understand (maybe)
Seeing what these functions do might help you troubleshoot or understand
how the KEY is generated.
The program starts by checking if a debugger is present and calculating a value
hexadecimal starting from two constants:
cost1 = "pearldarkk"
const2 = 0xDEADBEEF
the string const1 is split by character and put into an array.
string array[11] = "p, e, a, r, l, d, a, r, k, k"
then the XOR operator on const2 is executed for each character of the array[11]
until you get the hexadecimal value:
const2 = 0xDEADBEFE
this could be the generation of the FLAG we need or just a pitfall.
00E61050 the function starts from this address
then follows a function that examines the two values inserted in the GUI; FLAG and KEY and are processed.
00E61140 this function starts here
the flag value is processed with the wcstomb function,
00E61245 here maybe there is a sscanf function.
and finally it is checked and the multibytes of the string are checked via strncmp.
Multibyte value of FLAG "0121317d1d5d0701636e355f4b237e"?? |
==> |
@plasmagrass no trivial sorry, the key is generated by the username, is not hard to write a keygen, but not so easy :D |
==> |
Go to the start :) |
==> |
now try to write a keygen ! :D |
==> |
thank you! :D |
==> |
You can decompile the entire source code on autoit executable, using this tool bit.do/myAutToExe |
==> |
Here https://pastebin.com/KWPXCrCK |
==> |
if you can post a tutorial for resolve this crackme :D |
==> |