Yeah sure, so after i found out that it's written in rust i didn't want to waste a lot of time in static analysis, so I run it in x64dbg, and after seeing the key prompt I set breakpoints on ret from VirtualAlloc( + EX), after getting each newly allocated blocks I set hw bp's on them just to find out that the one one 0x180000000 becomes MZ header for the decryptor :)
if u have any more questions contact me on discord majorek1424 (638764515215015936) |
==> |
Thx, for sharing!
waiting for solution approval, so pasting it here.
very high quality crackme, but difficulty is a bit overrated.
https://pastebin.com/p5wWVp01 |
==> |
All the program does is check if first number is divisible by 7 if so, flag is printed!
https://pastebin.com/qe4eiX6R
thx for your work |
==> |
https://pastebin.com/6NMp071G - forgot |
==> |
My solution, thx for your work |
==> |
why would u ship this to us with dwarf info |
==> |
could you share the source code for it? I would really want to see to just for comparison 😁 |
==> |
After this one i think i may have some serious reversing skills, but it was very fun, waiting for part 3 of those adventures.
ps this fatherf*cker took me 15 hours of constant debugging
just to write the decrypter in 3 lines of code... (not including the data required for it).
anyway thanks for this crack me and i'm waiting for more!
GJ |
==> |
I feel very welcomed to those VMAdventures!
i love vms this one was pretty fun ngl
omw to checkout second part! |
==> |
kekstra, topkek
just look for it in IDA |
==> |