| AI - Almost Impossible |
@Ap0dexMe0 Your writeup is solid from a reverse engineering perspective, but the solver interface is conceptually inconsistent with the actual challenge design.
The binary generates a fresh target on every execution, and the only input available to the user is what is displayed in the GUI. A correct solver should therefore operate solely from that target representation.
However, your solver requires two separate inputs:
compressed_point_hex and encrypted_flag_hex
This assumes prior access to internal components that are not directly exposed to the user in a structured way. In practice, the solver should accept the full target as presented by the application and reconstruct the necessary components internally before proceeding with the attack.
In its current form, the script works more as a validation tool for the analysis than as a proper end-to-end solver for the challenge.
In short:
the reversing is correct, the attack is correct, but the solver interface does not match the real-world usage of the binary.
A complete solution would parse the displayed target automatically and recover everything from a single input, as the challenge intends. |
2026-04-19 22:47 |
| Lugosi's CrackMe II |
Sorry, there is a bug on this crackme. I will post the corrected version soon. Just cancel this one. |
2026-02-13 00:33 |