Sorry, I uploaded the wrong file, it is fixed now :) |
==> |
Great challenge !! I'll probably publish a solution soon :) Thanks and waiting for your next one |
==> |
Great crackme! Devil is in the details :) Quality 6/6! |
==> |
test |
==> |
Nice one ! Not sure if it's a bug but some usernames does not have solutions.
Here's one:
username: whodidletthedogsout
formula: DRRDDDDRRUURRRRUUURRDDDDDDDDDRRUURRUUUUUUURRR |
==> |
This one is easy, I changed its difficulty from 5 to 2. |
==> |
I found the vk webpage but don't know what to do next. |
==> |
I hope I'll have time to solve it soon. Looks really complex! |
==> |
Not sure what the crackme is supposed to print when you type the good inputs... Anyway, I think I solved it. |
==> |
It does not run on my machine |
==> |
I started to reverse this one yesterday, and I know it'll be difficult. Still on game_1, I already know which "opcodes" I need but I can't "generate" it. Maybe I should find another permutation. Does the password need to be printable ? Is there multiple password that validate this crackme ? Anyway, REALLY cool crackme |
==> |
The crackme isn't broken. There's a valid password. |
==> |
Thanks ttlhacker, that was one of the best crackme I solved. It took me literally 4 days! I used a different method than 4aca7f6c, and solved it dynamically with dynamorio. My main problem was to find the first check on the password (length check), and obviously, print out the instruction of the VM.
SHA1(flag) = e6cfd29b61e7006e8bf7573cd638bae85bb2d5e1 |
==> |
Updated ! :) |
==> |
Dude you just have to disable Windows Defender and it'll works. Don't ask authors to reupload their crackmes |
==> |
Pretty easy, I set its level to 2. |
==> |
Ah ! :) How am I supposed to solve this one ? |
==> |
I modified the difficulty, thanks for the feedback |
==> |
Sure ! I'll do it soon |
==> |
Done ! Interesting one, making a keygen without bruteforce isn't hard at all |
==> |
Congratulations 4aca7f6c, really interesting write-up. |
==> |
But patching is not interesting :) |
==> |
You can patch the crackme by transforming the jnz into jmp at 0x401321 |
==> |
crackmes.one, read the FAQ please |
==> |
I've added the source code in the zip file. The password for the source code is the flag which validate the crackme ! Good luck :) |
==> |
Done ! Really cool crackme :) I used Dynamorio for instrumentation (in order to look at VM registers).
Sha256(flag) = 8fbc397464bcf802e4091e42aff95ded2999e7041b187058cbe2b8818edad777 |
==> |
After a quick check this one seems interesting :) Gonna try it when I'll have time |
==> |
Congratulations pinnn ! As far as I know you're the only one who solved it yet. |
==> |
Again, really interesting solution wagio ! |
==> |
Great solution wagio! |
==> |
Cool VM, pretty easy. Perfect if you wanna start reversing VMs. |
==> |
I really liked this one. Totally new for me so a little bit difficult (rarely-used language). |
==> |
Do not forget to get some fresh air before opening this one in IDA... |
==> |
As far as I know, factorizing 512-bits rsa keys on a laptop is not trivial in 2018. Am I missing something ? |
==> |
Nice one !! I solved it but did not write a keygen. I'll do it when I'll have time
hw id: B088-AB64
name: 5tanislas
serial: e367a01ede6c7e626e87cb1246b4e259eaab28cebc2066796c9c4894808e9b0 |
==> |
As Towel said in his solution, this challenge isn't difficult enough for difficulty 3. I downgraded it to 2 |
==> |
i'm currently the only one admin and wasn't avalaible for the past ten days. I'll check your solution really soon :) |
==> |
Congrats XpoZed, well-explained solution |
==> |
Loved that one ! Even if I was stuck an entire day on the second stage. |
==> |