| nvm just noticed you put the src on solution :) Great job! |
==> |
| Spent quite a while on this one. Absolutely genius. Lots of techniques used by malware here. It would be absolutely amazing if you could provide the source code for us to study it! |
==> |
| Actually it seems to be puts address, not main |
==> |
| Sorry, let me rephrase that, I'm sleepy. I think I've successfuly found the address of main using the string vuln, and I think I should use this to add the offset of 'authenticated' to this address so i can redirect code to this procedure, but I'm clueless as to how do I do it |
==> |
| Solving this with GDB is fairly straightforward, since in debugging mode the address for the 'authenticated' function will always be the same. But I have absolutely no idea how to do it without it. Any tips? |
==> |
| @ragnar_crackbeard, would you mind sharing your solution? Mine goes like this (I plan on sharing it on solutions tab): ./keygenme $(python -c "print('E' * 464)") $(python -c "print('\x60'+'E' * 24)")
|
==> |
| Can u give me a help? Can't see to figure out what I'm supposed to do :( |
==> |
| Hey man, I think I've found what I need to do, but I'm no familiar with this technique is there anyway I can contact you so we can leave this discussion out of the comment sections? |
==> |
| I just sent a solution, is it acceptable? |
==> |
| Okay, I'll look into that, thx! |
==> |
| Hey what did you do with the file? I'm thinking you purposefully corrupted it. How did you do it and how do I work my way around it? |
==> |
| I don't understand what you are expecting of me |
==> |
| Nice one, when i saw your program loading the name of my computer i thought you was bamboozling me into sum malware weird shit lol. That was really funny. But, can you tell me what VMDetection() means and what it was doing? I kinda had to hardcore get through it lol |
==> |