SPOILER BELOW !
.........................
.........................
.........................
.........................
.........................
Enter login
asdwef
Enter password
e
successfully now select a number and it should be successful
106224
success |
==> |
#hmx78912 present(s) keygen for "booz-hash"
def boozhash(username):
v4 = 0
for char in username:
v2 = ord(char.lower())
temp = (1025 * (v2 + v4)) & 0xFFFFFFFF
v4 = (temp 6) ^ temp
v4 &= 0xFFFFFFFF
temp = (9 * v4) & 0xFFFFFFFF
v4 = (temp 11) ^ temp
return (32769 * v4) & 0xFFFFFFFF
def generate_key(username):
hash_result = boozhash(username.lower())
return f"{hash_result:08X}" # Uppercase 8-char hex
username = input("Enter username: ")
print(f"Password: {generate_key(username)}")
--------------------------------------------------------------
--------------------------------------------------------------
|Greetings to MBR| |
==> |
lol :D |
==> |
Thank you, it was really easy, maybe a "1" difficulty . |
==> |
Try it for yourself, then. It does work otherwise i wont be posting it :/ .
|
==> |
The password will be the "PID" so every time you restart the crackme, it will get a new "PID" so that will be the password. and to get the "PID" task-manager and go to details tab and find the crackme name, and you will see the "PID" which will be the password. |
==> |
Hmmm, lol. I guess i just have to accept defeat. but i will try figure out on how to properly encrypt the password, maybe copy others code , on the encryption side of things. :D |
==> |
def generate_serial(username):
"""Generate valid serial for given username"""
length = len(username)
calculated_value = 1337 * length
return f"AORE-{calculated_value}"
def get_bypass_code():
"""Return the bypass code"""
return "AoRE2025"
username = input("Enter username: ")
print(f"Calculated serial: {generate_serial(username)}")
print(f"Bypass code: {get_bypass_code()}") |
==> |
Also forgot to add: No PATCHING aloud.
GOAL: FIND PASSWORD |
==> |
Thank you for trying my challenge hope you enjoyed it |
==> |
Okay no worries, nightxyz, and yes i did take a look at your "profile" you love doing crackmes! and congrats. i will be writing a V2 challenge with better ways to encrypt the password :D |
==> |
Yes Lilsan44444, someone seemed to have changed it, was originally a difficulty of '3' |
==> |
Thank you robica59, please upload a write-up |
==> |
nightxyz, why did you have to spoil it ? and secondly something is telling me that you probably just brute forced/guessed the password... you explained nothing, ON the reversing process. so i wont class this as a success (LACK OF EVIDENCE) |
==> |