Share how awesome the crack me was or where you struggle to finish it! Stay polite and do not spoil the solution/flag!
6:28 PM 01/17/2022
gl, add me on discord if you solve Milxnor#3531 id: 839920351416025108
korsader on 7:32 AM 01/29/2022: Welcome! Please enter an username: korsader Please enter your password: 806601 Somehow you got it right!
danleb on 5:14 PM 02/04/2022: It was interesting, thank you! My solution: Welcome! Please enter an username: danleb Please enter your password: 411994 Somehow you got it right!
nogame on 12:32 PM 02/22/2022: Welcome! Please enter an username: nogame Please enter your password: 435390 Somehow you got it right! nogame = 0x6e 0x6f 0x67 0x61 0x6d 0x65 sum = 0x6e + 0x6f + 0x67 + 0x61 + 0x6d + 0x65 sum = 0x277 = 631 password = sum * (int)(sum * 1.093829989433289) password = 631 * (int)(631 * 1.093829989433289) password = 631 * 690 password = 435390
db123 on 8:51 AM 06/20/2022: username: db123 password: 132240 1. remove debugger check by change jz to jmp. 2. input a user word. find code at: .text:00007FF79A381640 .text:00007FF79A381640 loc_7FF79A381640: ; CODE XREF: check_password+A6↑j .text:00007FF79A381640 F2 0F 59 05 78 40 00 00 mulsd xmm0, cs:qword_7FF79A3856C0 .text:00007FF79A381648 F2 0F 2C C0 cvttsd2si eax, xmm0 .text:00007FF79A38164C 48 63 C8 movsxd rcx, eax .text:00007FF79A38164F 48 0F AF CF imul rcx, rdi .text:00007FF79A381653 48 3B D1 cmp rdx, rcx .text:00007FF79A381656 0F 85 C6 01 00 00 jnz loc_7FF79A381822 debug it, you will get a hex vlaue in rcx. convert it to dec value, and change to string. it is the password.
Sems on 2:09 PM 09/02/2022: Guys, why can't I see anything in the strings section of the object oriented crackmes written with c++ libraries (for example, the strings used for cout)