downloadbrowseDJ1hAD0's DJ1hAD0's newbie decryptme1

Download DJ1hAD0_s_hewbie_decryptme_1.zip, 9 kb (password: crackmes.de)
Browse contents of DJ1hAD0_s_hewbie_decryptme_1.zip

It's a very easy small decryptme for absolute newbies, like me:)

Just find the magic word for decrypt hidden message.

Everything is allowed;)

Difficulty: 1 - Very easy, for newbies
Platform: Windows
Language: C/C++

Published: 25. Aug, 2016
Downloads: 543

Rating

Waiting for at least 3 votes
(we have only 1).

Rate this crackme:

Send a message to DJ1hAD0 »

View profile of DJ1hAD0 »

Solutions

Solution by Astrocyt, published 20. oct, 2016; download (50 kb), password: crackmes.de or browse.

Astrocyt has rated this crackme as nothing special.

Solution by pixelpirat, published 20. oct, 2016; download (1 kb), password: crackmes.de or browse.

pixelpirat has not rated this crackme yet.

Solution by beaver, published 20. oct, 2016; download (1 kb), password: crackmes.de or browse.

beaver has not rated this crackme yet.

The submission of solutions is closed.

Discussion and comments

sn4pf1sh
29. Aug, 15:36
Can anyone give me a hint?
beaver
30. Aug, 12:31
sn4pf1sh, 4013A9 fgets call
luxdav
30. Aug, 14:40
Was fun! Thank you!
"Congratulations! You won, Dude! Please, send your solution."
sn4pf1sh
30. Aug, 20:22
I don't know what to do with the hashed string ""W{zsfu`axu`}{zg54M{a4c{z84Papq54Dxqugq84gqzp4m{af4g{xa`}{z:4OP^%|UP$I""

@beaver: Thx, but this didn't help, maybe i'm missing something?
luxdav
31. Aug, 00:01
spoiler alert:

The first thing you can do is decrypting the string without the magic word. The first part of the code checks if your magic word is correct, the second part decrypts the string (second part starts at 401401). If you solved the decryption, think about how the password has to look like, you want to enter the second part.
beaver
31. Aug, 06:14
sn4pf1sh, just XOR(wierd_string, 0x14). 14 is the result of the subtraction.
sn4pf1sh
31. Aug, 22:11
Can anyone please post a solution? This CrackMe is quite interesting and would help me for understanding the (ASM) decrypting logic. Thank you anyway @beaver ;)
luxdav
01. Sep, 00:22
I actually found my own password "luxdav__|"
luxdav
01. Sep, 01:10
This is my uncommented solution: https://github.com/LuxXx/reverse-engineering/tree/master/DJ1hAD0
But really, try it yourself again, looking up my solution will ruin your fun.
sn4pf1sh
01. Sep, 13:17
Ok, thank you guys, especially @luxdav and @beaver. This helped me a lot. Now I'm able to understand control flow of the logic. I wrote the decrypting logic for myself in ANSI C and debugged this in x64dbg. Now I understand a lot more. Sorry for my bad english! :)
luxdav
06. Sep, 18:18
I had some time and wrote a tool that generates some passwords: https://github.com/LuxXx/reverse-engineering/tree/master/DJ1hAD0/solution/password/bruteforce
It wasn't necessary but I wanted to do it.
herbie
28. Sep, 19:29
My own password: herbie{c}
rentf
06. Oct, 19:23
My password is: rentf{Zc}

#include <stdio.h>
int main() {
char in[10];
int a = 0;

fgets(in, 10, stdin);

for (int i=1; i<=9; i++)
a += in[i];
if (a != 866)
printf("%i>866", a);
else
printf("Bingo!");
}
rickolous
28. Nov, 02:44
I wrote a very thorough walkthrough for this problem. Here is a link to my github.io page [https://rickolous.github.io/2016/11/27/very-easy-1-windows/]

You may leave your comment, thoughts and discuss this crackme with other reversers here.
Acting childish will not be tolerated.
HTML and such will be left as-is, so don't try.