downloadbrowseksydfius's Ksydfius Crackit I

Download ksydfius1.zip, 1 kb (password: crackmes.de)
Browse contents of ksydfius1.zip

A little crackme which can be solved in 1 sec
(if u know what it is doing...)

not very hard, just some ASM code and bitwise operations

-ksydfius

Difficulty: 2 - Needs a little brain (or luck)
Platform: Windows
Language: Assembler

Published: 05. Sep, 2012
Downloads: 309

Rating

Votes: 4
Crackme is nothing special.

Rate this crackme:

Send a message to ksydfius »

View profile of ksydfius »

Solutions

Solution by ThePoolGuy, published 02. oct, 2012; download (3 kb), password: crackmes.de or browse.

ThePoolGuy has rated this crackme as awesome.

Solution by freesoul, published 14. sep, 2012; download (7 kb), password: crackmes.de or browse.

freesoul has rated this crackme as quite nice.

Submit your solution »

Discussion and comments

mausy131
05. Sep 2012
First it didn't run.. Just open it in olly and you are able to crack it
cyclops
Moderator
05. Sep 2012
^^It runs perfectly on my machine.
Please note: There is no user input as such. You have to modify the code/data (you will see where and what to modify in the disasm) itself to get the good boy msg.
bearchik
06. Sep 2012
Key: 25 75 52 74 05 76 33 72 0E 31 73 52
For solved this crackme need substitute in function's argument value that use in compose.

Example:
.text:004010D0 pop eax ; in eax part key
.text:004010D1 call sub_401091 ; function calculating key
.text:004010D6 cmp eax, 19496E48h ; cmp with true value
.text:004010DB jnz short loc_40111C

Enter in eax 19496E48h before call
result == 25755274h

Enter in eax 25755274h before call
result == 19496E48h

Repeat this in all other call.
cyclops
Moderator
06. Sep 2012
bearchik: dont spoil the phun. (I have removed the second comment).
ksydfius
Author
06. Sep 2012
its very easy to solve, yes

sorry to say, but ur key is incorrect
although it generates the correct results at the CMP, it doesnt decrypt the goodboy message

and, do u understand why that happens when u said:

Enter in eax 19496E48h before call
result == 25755274h

Enter in eax 25755274h before call
result == 19496E48h
freesoul
06. Sep 2012
Hey, I'm taking a look at your crackme, I reversed your first functions and I wonder why I get this:

Test reverseBits(0x0E86CECE) output: 73736170 ("pass" just for test)
Test _decode(0xF8BC9898) output: 73736170
Test decode(0x2F4F5D4C) output: 13736170 <- Actually idk why that 1

I guess solution is on understanding that '1', I'll dig deeper when I've time, greets :)
ksydfius
Author
06. Sep 2012
hi freesoul,

there are multiple passwords that will work at the CMP, but only 1 will successfully decrypt the goodboy message

i can tell u that so far, u seem to be on the right track, but this bit:
f(0x2F4F5D4C) = 0x13736170
isnt very important :)

also, keep in mind that the password consists of chars in the range 0x20 to 0x7B and that it makes sense

good luck :)
_sid
06. Sep 2012
ThE_CoDe_Is: ... well won't spoil this :)
Nice & fun.
ksydfius
Author
06. Sep 2012
hehe, good job :D

my next ones will be more interesting :)
redoC
07. Sep 2012
I can't get it. What is the 12 byte serial?
freesoul
07. Sep 2012
Ow finally I got it lol. I didn't even look at the second part of the crackme, I prefered to permute 2^6 :)
ksydfius
Author
07. Sep 2012
hey redoC,

this probably isnt as hard as u think
just analyze the code a bit, you'll find it :)

good luck!
pegazuz
10. Sep 2012
well i figured some of the message but some letters are not readable. any clue?
freesoul
10. Sep 2012
pegazuz: analyzte loop by loop, then change what you've to change :)
ksydfius
Author
10. Sep 2012
if u have some of the message then u are very close...
just try it some more, u will get it ;)
pegazuz
13. Sep 2012
you were right :) just using the fact u need ascii :)
should i post the passkey?
ksydfius
Author
13. Sep 2012
nah, write a tutorial instead ! :)
ksydfius
Author
14. Sep 2012
freesoul,

nice solution!
u understand what the crackme is doing and explain very well
the loader is a nice one, too

thx :)
_sid
14. Sep 2012
hmm, there's nothing to guess or brute; if you revert the ops, you will get the right solution ...

You may leave your comment, thoughts and discuss this crackme with other reversers here.
Acting childish will not be tolerated.
HTML and such will be left as-is, so don't try.