| Easy crackme |
2026-02-21 14:34 |
# Writeup for Easy crackme by maxpsger
## Tools Used
* **Ghidra** (Static Analysis)
## Analysis Process
1. **Initial Analysis**: I loaded the binary into Ghidra and performed the standard auto-analysis to recover the program structure.
2. **Function Renaming**: To simplify the reversing process, I identified and renamed the core subroutines based on their signatures and logic.
3. **Locating Main**: I navigated to the `main` function to analyze the execution flow.
4. **Credential Recovery**: Inside the logic of the `main` function, I found a straightforward comparison of user input with hardcoded strings. The algorithm was clear and easy to read.
## Solution
The binary expects the following credentials to grant access:
Username: crackme
Password: Rickroll
|