004021BD | 0F84 AD000000 | je ul_win.402270 | patch this = cracked |
==> |
I wrote a keygen and am waiting for the solution to be posted |
==> |
ru: подсказка: имя пользователя вашего пк
en: Hint: Your PC's user name |
==> |
en: I wrote a solution and published it, it will be added soon, the idea is interesting but the implementation is poor, you inject an empty dll and just check if the dll is in the .exe folder, I patched this check and voila, I can run the .exe without a protector
ru: я написал решение и опубликовал его, скоро добавят, задумка интересная но реализация никакая, ты инжектишь пустую длл и просто делаешь проверку есть ли длл в папке с .exe, пропатчил эту проверку и вуаля я могу запускать .exe без протектора
|
==> |
the point is, it doesn't even open, and it says um... try again? |
==> |
004019A1 | 74 21 | je keygenme90.4019C4 | patch this valid key
p.s I'm too lazy to search for password and login verification, and there are too many wrapper functions for me to explore each one. |
==> |
EN: What's the point if it accepts any password and writes "you win"?
RU: А в чем суть, если он принимает любой пароль и пишет you win? |
==> |
0000000140007DA2 | 74 6C | je crakersme.140007E10 | this patch
try find password, cpuid nice, but hash its bad |
==> |
@dredge maybe can you give your tg or other messengers? |
==> |
@dresge, wow legend! make writeup please |
==> |
@nightxyz, you're not looking well bro, the title is directly related to the task, hint: watch runtime carefully |
==> |
Hasn't anyone tried it? Tell me what the difficulty is, and I'll try to help you. |
==> |
@nightxyz, thanks for your answser, wait new today or tomorrow |
==> |
@nightxyz, bro you legend! i have really hard crackme with many defence, I'll upload it here today. |
==> |
@nightxyz, I'll make a new one tomorrow, but it will have some self-written protection that I'm making for my future project. I'll need to check it out. |
==> |
nightxyz, was it too easy? just don't feel like adding different obfuscations and so on |
==> |
good, i think its was be hard, i remake this |
==> |
0000000140001509 | 73 22 | jae crackme.14000152D | breakpoint and f9 and makepass in stack |
==> |
i am patch this, but i dont understand crash it is anti-debug or bug? |
==> |
00007FF72C5D2A2C | 74 2D | je ctf_level6.7FF72C5D2A5B | we set the breakpoint and then change the zf from 1 to 0 |
==> |
this is really hard i cant find solution but i find password maybe 50 symbols, and ebp-140 and ebp-150 maybe work with password |
==> |
Great crackme! The use of C++ STL vectors and bitwise operations added a nice layer of complexity, making the reverse-engineering process engaging. The "matrix" theme and AI-related functions (AI::generate_matrix, AI::calculate_score) were intriguing, though their lack of impact on the final result slightly reduced their significance. Including a unique pattern or additional constraints could enhance the challenge. Overall, well-crafted and fun to solve!
|
==> |
Отличная идея! Использование C++ STL-векторов и побитовых операций добавило дополнительный уровень сложности, сделав процесс обратного проектирования увлекательным. Тема "матрица" и функции, связанные с искусственным интеллектом (AI::generate_matrix, AI::calculate_score), были интригующими, хотя отсутствие их влияния на конечный результат несколько снижало их значимость. Включение уникального шаблона или дополнительных ограничений могло бы усложнить задачу. В целом, все хорошо продумано и решать его интересно! |
==> |
Great crackme challenge! The logic was clear, and the use of XOR and arithmetic checks made it engaging. Including sub_140001EE0 added a nice layer of complexity. A hint about case sensitivity would improve clarity. Thanks for the fun reverse engineering task!
|
==> |
how do I open your file? |
==> |