| Silent Lock |
main XOR-decrypts the prompt [>] Enter the password: (key 0x69), reads user input via cin/getline.
validate_password (0x1400017C0) handles three input lengths:
8 chars: Hash loop using i * input[i] (key "Pass1234" stored as decoy)
16 chars: XORs input with "PWD!!^-12345-!XD", sign-extends bytes to dwords, adds i*7 constants, XORs with (i%4)*4, sums all 16 values
27 chars: XOR with "This1st00easyineedh4rders!" + accumulator hash
main independently computes the expected value using the formula ((i*4 & 12) (i*7)) for i=0..15 = 840, then (3 × 840) 0x55 = 2445.
When the input is PWD!!^-12345-!XD, the XOR with the same key produces all zeros, and the SIMD computation yields exactly 840 (3 × 840) 0x55 = 2445, matching the expected value.
On match: prints [+] Congrats, you solved me!; otherwise: [-] You failed, try again. |
2026-03-07 14:08 |
| [INSANELY HARD] Uncrackable.exe |
--- CrackMe Challenge 2025 ---
Enter License Key: I_CRACKED_IT_2025_LOL!
Success! Youre a Beast!
|
2026-01-18 10:03 |
| Skill issue v2 |
main validates password positions 3-19 by xoring each char with 0x5A adding the index then xoring with 0xA3 and comparing against bytes at 0x1400cc06d reversing gives _!{N00bCrackm3}!_ theres a strlen check wanting 22 chars from buf+1 so 23 total needed plus IsDebuggerPresent anti-debug that exits with 0xDEADC0DE the broken part is print_success at 0x140001950 loads wrong string address 0x1400c8090 which contains the fail message instead of 0x1400c80b0 with correct message both xor 0x69 encrypted at runtime patch file offset 0xd59 from 0x33 to 0x53 to fix the lea offset then any 23 char password with _!{N00bCrackm3}!_ at positions 3-19 works like XXX_!{N00bCrackm3}!_YYY
|
2026-01-18 09:06 |
| Determinism2 |
You: secret
Guardian: What is your password? I promise i wont tell anyone.
You: \nxwNonw|[gWw{^MSk
Guardian: You're one of us, welcome!
I'd appreciate your feedbacks :) |
2026-01-18 05:27 |