
Kirjava's Morph
Download Morph.zip, 46 kb (password: crackmes.de) Browse contents of Morph.zip Hello!
Difficulty: 4 - Needs special knowledge | Send a message to Kirjava » View profile of Kirjava » |
Solutions
Solution by bike, published 26. mar, 2014; download (2 kb), password: crackmes.de or browse.
bike has rated this crackme as quite nice.
Discussion and comments
demoth 20. Feb 2014 | Thank you for this case! Very good crackme. :) I did it: 823705bb...(md5 of key) :) I don't have time to write a solution, but I'll do it later. |
---|---|
Kirjava Author 20. Feb 2014 | Well done! You are one fast reverser! I guess I set the difficulty a bit too high or maybe you are just awesome. Probably both. |
demoth 21. Feb 2014 | Kirjava, the most difficult part is function 0xE71170 after that just break on 0xE71010 and see why fall. Total 3.5 hours. Some checks after "obfuscate" make analysis of 0xE71170 easier. |
fine 01. Mar 2014 | well,it handsome |
adwi32 20. Mar 2014 | its kinda hard. I guessed 1 byte of password only :D I know whats going on but i cant figure out how to guess the more letters. Looking forward for tutorial. |
adwi32 29. Mar 2014 | wow, good job bike. I had tunnel vision on the code morph function and tried to guess all letters only using this function. I havent even look deeply in "NOPE!" functions, I thought its non-important. Because why would it be? The program main flow just checks lenght, and last char of the password, and if thats ok, it goes to code morph function. So if thats non-valid, what is point of checking particular letters in "bad boy" function, its wrong anyway? |
You may leave your comment, thoughts and discuss this crackme with other reversers here.
Acting childish will not be tolerated.
HTML and such will be left as-is, so don't try.