base on constant: 0xCBF29CE484222325 |
==> |
user: admin
password: password
key 1: xx@oxxwwxx
key 2: x@x07x00xx
key 3: 2022 (3 times) |
==> |
@X3eRo0: Then the answear to the flag is yes. I enjoy it a lot. Gonna make a write up soon :D |
==> |
zh3r0{d1d_y0u_enjoyed_r3v3rs1ng_w1th0ut_b1n4ry_?}
Is that correct? |
==> |
@nassimorg09:Good to see you have bypassed some anti debug tricks. You're still in the begin at solving this but good move. You might want to dig to how does crackme actually work. Hope someone can share there solution so other people can learn from it. |
==> |
@PastorJimColerick: Just ignore him. It's not worthy. BTW seem that you also solve this crackme. Congrats :) |
==> |
@xmaple555: I remember I just change a bit in last letter check. You can calculate it easy with script :) |
==> |
Congratulation puelo :) |
==> |
So "rock_noll_vo" means rockyou.txt and Fowler–Noll–Vo hash. Nice hint xD. Hope I can make solution soon. |
==> |
if hash_64_fnv1a(key) == 0x6658A617BCCE24D5) then correct. Is that true?
|
==> |
Hmm you forgot deleting the function at 0x4014A8. Using this function I was able to generate my own valid serial :)
Elvis/6nNx9Q============ |
==> |
Hmm I have found out the idea. Nice crackme BTW :) |
==> |