| Easy Rust crackme |
i dropped the binary into binary ninja and switched straight to the pseudo rust view to bypass all the rust compiler bloat and mangled symbols. the logic was sitting right there in a loop.
the program prompts for a username and password using sub_140004570 and grabs the input via sub_140004370. since rust loves to optimize small strings (up to 8 bytes) by treating them as immediate u64 values in registers, i just looked for the comparison constants.
found two hex values being checked: 0x7372656b63617263 for the user and 0x746e756873736170 for the pass. because of little-endian storage, i just flipped the bytes and converted to ascii.
username: 0x7372656b63617263 -> s r e k c a r c -> crackers
password: 0x746e756873736170 -> t n u h s s a p -> passhunt
the if check validates both, hits the Correct!!! branch, and we're out. easy flag. |
2026-05-03 12:04 |