downloadbrowsedip22e's CrackMe #1 by dip22e

Download crcme.zip, 2 kb (password: crackmes.de)
Browse contents of crcme.zip

** CrackMe #1 by dip32e

Find a forgotten password...
It's so easy...

Coded in assembler.
Happy cracking :)

Difficulty: 1 - Very easy, for newbies
Platform: Windows
Language: Assembler

Published: 30. Jan, 2009
Downloads: 1785

Rating

Waiting for at least 3 votes
(we have only 2).

Rate this crackme:

Send a message to dip22e »

View profile of dip22e »

Solutions

Solution by main, published 05. feb, 2009; download (2 kb), password: crackmes.de or browse.

main has not rated this crackme yet.

Solution by macduff, published 05. feb, 2009; download (2 kb), password: crackmes.de or browse.

macduff has not rated this crackme yet.

Solution by sghctoma, published 05. feb, 2009; download (13 kb), password: crackmes.de or browse.

sghctoma has not rated this crackme yet.

The submission of solutions is closed.

Discussion and comments

macduff
01. Feb 2009
Great one; I hadn't seen that method for checking for debugger before.
main
02. Feb 2009
How many correct passwords must the keygen produce? Is like 4 passwords enough?
dip22e
Author
02. Feb 2009
@main: Yes. However, the best solution is random s/n generation algorithm (all correct passwords).
main
04. Feb 2009
Nice that it uses TIB->PEB. I like that. Solution on the way.
Nick_Meister
17. Feb 2009
oooh yay this is my first crackme ever, lol and i solved it without using a runtime debugger, i just read the dissassembly , i must say pretty nice, and i even found the point where you check for the debugger :D
Kainat
22. Jun 2009
perl -e "for($i=9;$i--;){print $i?chr(97+($i-(97%$i))+(int(rand(int(25/$i)))*$i)):"\n";}"
ShadowRayzz
30. Jul 2009
Very interesting anti-debugging method, first time i see something like that :D
deibiz_xxl
30. Aug 2009
@Kainat... if that is a routine for serial generation... it is forbidden to post it here.
deibiz_xxl
30. Aug 2009
lol... I have python keygen... if someone wants to see it, message me.
s0cial_integir
08. Apr 2011
I am still learning tha BASICS of cracking, it surely takes a smart person. I tried cracking this myself and i couldnt work it right, i tried all 3 solutions and nothing in tha solutions match what i have or see in my debugger/disassembler. I use olly, there are no intermodular calls, or any coding that suggests anything they show on solutions. I try hiew but then i cant run debugger with it that i know of. its one dead end road after another.. help if anybodys interested...
Chug
12. Apr 2011
s0cial integir, I feel your pain. I'm a newbie myself it wasn't so long ago I was where you are now. It not so much smartness thats needed but knowledge. Anyone who thinks there is an easy path to it is mistaken. Have you started with Lena151's tutorials yet? They're the way to go believe me.

Where are you stuck exactly? There are 9 intermodular calls I noticed. This program uses a trick to confuse an unmodified Olly - find a fixed edition or study some tuts. I used an find API call search, GetDialogItemTextA and set a BP on that but you could just step the code - the serial algorithm is right beneath it. Heres a hint - find out what CDQ and DIV do. Good luck!
edza
15. Nov 2014
Hi! Very cool crackme for a complete beginner like me. First ever keygen I wrote, second solved crackme ever. Thanks guys for making these beginner level too. To you it might be too "booring", but it was fun for me to learn.

Link is pastebin for C# keygen.

http://pastebin.com/v4XpgZG2

(Sorry about the variable names, i made this while I couldn't sleep and didn't think about showing it to others. I think the algorithm is self-explanatory to an extent) :)

You may leave your comment, thoughts and discuss this crackme with other reversers here.
Acting childish will not be tolerated.
HTML and such will be left as-is, so don't try.