Number of crackmes:
Number of solutions:
Comments:
Name | Author | Language | Arch | Difficulty | Quality | Platform | Date | Solution | Comments |
---|---|---|---|---|---|---|---|---|---|
Bobby | sporta778 | C/C++ | x86-64 | 2.2 | 5.0 | Windows | 10:52 AM 03/06/2024 | 1 | 16 |
Crackme | Infos |
---|---|
VM_Madness | Solution for VM_Madness |
VMAdventures 2 | Solution for VMAdventures 2 |
Easy Password Reverse 2 | Easy Password Reverse 2 by Clyax |
pavler4VM | solution for pavler4VM |
virtual.1 (Win) | Just soultion for virtual.1 crackme. |
aname crackme | Solution for crackme aname. |
messy crackme | Solution for messy crackme by aname |
Comment | Link |
---|---|
it is not question in time, it is straight forward crackme... here no things to surprise... | ==> |
In my opinion, manually unpack this is receive working .exe file. Maybe i do not understand something? | ==> |
"good luck? ;)" important words for this crackme, going throught code and finding important comparing. Maybe here can be writed interest solution? Maybe... | ==> |
khmmm, i do not understand, program unpacking yourself... And why so high score of crackme? instills fear..... | ==> |
I send solution... | ==> |
your* | ==> |
This difficulity do not accroding presents. I think it difficulity 1.5. What can do you UPX-Patcher, or even just UPX packer, if program just unpacking yourself. Where obfuscation? I do not see it. I will write solution. | ==> |
if they approval approval , go next | ==> |
I send solution, i am too I'm in a hurry. Here present uniformity with VM | ==> |
ANY-K$Y $ any symbol , and you can add any string to it, i writed solution, and i send it on site... | ==> |
sorry no needed , i found it... | ==> |
Hehe... here some secret. Rbx after calling functions of core VM do not changed , but after first call of it function it loaded by zero from eax, in which saved memory0 (but memory0 loaded in first function by zero).Memory0 = qword [rcx] (rcx loaded at input of core function). | ==> |
I understand you, but if you will see at this https://crackmes.one/crackme/65f1f892cddae72ae250b57e, i interpret this crackme as microcomputer becouse it microcomputer have RAM (random access memory) and RAM2. I think it no problem call it virtual machine , but for me it is too loudly. This is just my cockroaches. | ==> |
okay if it will hard i will ask... | ==> |
no no i think i do not ask , i already process first function, and i now started learn second call this function of proccessing codes of microcomputer. i think i can find password and write disassembler. Just ANY- i found. But i think it loudly said that this devirtualizer. I call it disassembler. But maybe i do not understand some abstraction. | ==> |
It loudly said VM, i call it microcomputer. i was surprised, but codes changed after restarting application... | ==> |
goal: find password ... | ==> |
sixpek try to it https://crackmes.one/crackme/661daf77cddae72ae250c836 | ==> |
nice , i am writing solution. i was surprised some things.. | ==> |
some activation microcomputer writer's.... | ==> |
sorry , disassembler | ==> |
nice place to write debugger....)))) | ==> |
@justAuser if understand correctly, you just need use cmd.exe. console application. | ==> |
ehhhh sorry , i thinked Ghidra it is super secret algorithm, it is just disassembler... it hard to me speculative analyze code.... just debugger.... | ==> |
it cool , i found one yet article where crackme solved with this angr. it enough hard to realize it.... | ==> |
looking at you, I'm freaking out. | ==> |
by the way name Bobby it is just from my fantasy. | ==> |
cnathansmith i think i have low IQ to understand this humor, maybe i do not understand some context. | ==> |
? | ==> |
Now Bobby glad;)) | ==> |
you are ambitious, urine them;)) | ==> |
do not offend my Bobby!;)) | ==> |
it's strange how in two applications random can give some subsequence identical numbers??? | ==> |
*myself | ==> |
maybe i do not understand but how you can transofmate this code in just random%62. | ==> |
62 look like %0x3e | ==> |
i give up , i can just it make in yourself program but i do not understand physical meaning: call add rbp,1 mov edx,eax cdqe imul rax,rax,FFFFFFFF84210843 mov ecx,edx sar ecx,1F shr rax,20 add eax,edx sar eax,5 sub eax,ecx imul eax,eax,3E sub edx,eax movsxd rdx,edx movzx eax,byte ptr ss:[rsp+rdx+20] mov byte ptr ss:[rbp-1],al cmp rbp,rbx jne untitled1.7FF710F315E0 how it can be some %62 ? i do not understand | ==> |
One second enough time to run in 2 cmd windows's 2 application's : crackme and keygen, and the will have same time received by the _time64(<ime). | ==> |
p.p.s and yet , one second for microprocessor this is how one year for us:))) | ==> |
p.s. do not swear to me , i am figuratively know that is time attack:)) | ==> |
In really i think it big word that this timing attack. _time64 return time with resoultion 1 second. I think here can be maded stay along application and it will can give several result's in which we can find true password. | ==> |
Nice cnathansmith. | ==> |
uhhh i like socket's, but in really commands's of crackmes.one what number of people's you have in your compund's? And what is your IQ.... | ==> |
Mahesh, look like some social engineering?)) | ==> |
Just in debugger press f9 3 times, and u will located at EntryPoint of application. | ==> |
here just some manipulation with username | ==> |
later this is assembler, what about u talking, just u need think. just use debugger, here no hard thing , later. What about talking, what is class. Just using username, i think i can solve it | ==> |
this is not show off)) | ==> |
this is not according to overview. especially difficulty level. Later... | ==> |
hehe olives8 contains in offset 0x250 in file... | ==> |