The password is XOQIBwcLudyp6NG.
I am new to reverse engineering, and I have try for couple days using x64dbg, search for string references and intermodule calls.
For the string references, I cant get any useful information. For the intermodule call, I try breakpoint the MessageBox but nothing is hit when the error MessageBox pop out.
After some online searching, I find some similar video that cracking a .NET program which give me some information that the .NET program can detect the debugger attach with isDebuggerAttach (or something).
So I try ILSpy, and it works.
From the code, you will get a if else statement:
private void button1_Click(object sender, EventArgs e)
{
string text = keyfield.Text;
if (text == "XOQIBwcLudyp6NG")
{
MessageBox.Show("nice, you did it");
Application.Exit();
}
else
{
MessageBox.Show("nope, thats not it");
}
}
I dont know if I am telling the points correctly or not, but this is my understanding until now |
==> |