Number of crackmes:
Number of solutions:
pranav, I got the answer. My first crackme back after quite awhile so my brain didn't realize to check the auth file for myself and to write a binary file for my answer. Not just put my answer into a regular txt file lol. Thanks! I'd still like to know how to reverse the anti-debugging tricks if you could teach me!
Okay, pranav. I see where to do it. But I can't figure out exactly what byte is being read and returned during the calls to fread when it reads the AUTH and KEY files. I'll keep trying to do it with IDA. However, could you tell me which tricks are utilized so I could google them and practice removing them for future scenarios, please?
Hello. Are there anti-debugging tricks involved? I don't seem to see any but if I try to debug this in say x32DBG or ollydbg it won't properly run. I see there are new threads being created but in x32DBG for example it never returns from a simple call to Sleep. @ 0x00401675 it calls sleep, as shown in this picture but if I hit step over, it exits the program. And doesn't run as it does when not in a debugger. https://imgur.com/a/QMm8PxD
W00000. Thank you! I'm fairly new. Finally got it! I wanted to give up so many timeS! Let's just say I was 2 sl0 and it took 424 tries ;)
IZIPIZI VBHPWYGBUTBOGPQJWYPBZAWPG Jk about the easy part though. It took me awhile to do but it was fun, so thank you! :)
Thanks for a fun one! Thanks for giving us the source code to contrast and compare with afterwards too! :)
Thank you 4rr4y I GOT IT FINALLLY :):) A perfect hint. It told me hardly anything but i knew to stop trying to figure out how this main code could possibly be doing some magical jump haha
I hope someone writes a solution for this. I have been trying it all day. I got the first key easily enough, the one that doesn't print anything '1a4f'... However I've reversed every single line of user-code in this thing and can't figure out how this can work. I patched it but certainly that's not the solution, as I see timotei posted the actual good-boy.