nvm just noticed you put the src on solution :) Great job! |
==> |
Spent quite a while on this one. Absolutely genius. Lots of techniques used by malware here. It would be absolutely amazing if you could provide the source code for us to study it! |
==> |
Actually it seems to be puts address, not main |
==> |
Sorry, let me rephrase that, I'm sleepy. I think I've successfuly found the address of main using the string vuln, and I think I should use this to add the offset of 'authenticated' to this address so i can redirect code to this procedure, but I'm clueless as to how do I do it |
==> |
Solving this with GDB is fairly straightforward, since in debugging mode the address for the 'authenticated' function will always be the same. But I have absolutely no idea how to do it without it. Any tips? |
==> |
@ragnar_crackbeard, would you mind sharing your solution? Mine goes like this (I plan on sharing it on solutions tab): ./keygenme $(python -c "print('E' * 464)") $(python -c "print('\x60'+'E' * 24)")
|
==> |
Can u give me a help? Can't see to figure out what I'm supposed to do :( |
==> |
Hey man, I think I've found what I need to do, but I'm no familiar with this technique is there anyway I can contact you so we can leave this discussion out of the comment sections? |
==> |
I just sent a solution, is it acceptable? |
==> |
Okay, I'll look into that, thx! |
==> |
Hey what did you do with the file? I'm thinking you purposefully corrupted it. How did you do it and how do I work my way around it? |
==> |
I don't understand what you are expecting of me |
==> |
Nice one, when i saw your program loading the name of my computer i thought you was bamboozling me into sum malware weird shit lol. That was really funny. But, can you tell me what VMDetection() means and what it was doing? I kinda had to hardcore get through it lol |
==> |