downloadbrowseksydfius's The XOR Algorithm II

Download ksydfius3.zip, 2 kb (password: crackmes.de)
Browse contents of ksydfius3.zip

well my first edition of the xor algorithm was too easy
but perhaps that is because u know the position of the key
that is XORed with the plaintext?

anyway i have adjusted the algorithm with a simple modification :)

did this make the algo more secure?

:)

Difficulty: 2 - Needs a little brain (or luck)
Platform: Windows
Language: Assembler

Published: 19. Sep, 2012
Downloads: 403

Rating

Votes: 5
Crackme is nothing special.

Rate this crackme:

Send a message to ksydfius »

View profile of ksydfius »

Solutions

Solution by morecode, published 16. dec, 2012; download (260 kb), password: crackmes.de or browse.

morecode has not rated this crackme yet.

Solution by ivvei, published 02. nov, 2012; download (2 kb), password: crackmes.de or browse.

ivvei has rated this crackme as quite nice.

Solution by RandolphCarter, published 10. oct, 2012; download (581 kb), password: crackmes.de or browse.

RandolphCarter has rated this crackme as quite nice.

Solution by ThePoolGuy, published 02. oct, 2012; download (40 kb), password: crackmes.de or browse.

ThePoolGuy has rated this crackme as quite nice.

The submission of solutions is closed.

Discussion and comments

kingdeking
19. Sep 2012
Hey, great job... seems like that change wasnt of much use ;) anyway the answer is cryptanalysis_ftw

Enjoyed this one ;0
ksydfius
Author
19. Sep 2012
wow, very fast :) good job!
ivvei
26. Sep 2012
I have a question: At
00401116 lea esi, dword ptr [403000], here is a string I think may be the key string which starts wih a "W", hex 57, but,
0040111C lea edi, dword ptr [4030F1], here is hardcoded with a HEX 87.
Then mov them to al and cl, and cmp al, cl, and there is a JNZ which would surely be taken. It directly jump to the end of this program. So if the above I am not wrong, how could it possible to jump to 00401137 where has a key call?
ivvei
26. Sep 2012
I also tried the answer of "cryptanalysis_ftw", but it did not work. The successful scene seems to like this: pop out a messagebox contains a text of "Nice one!" Sadly, the string "cryptanalysis_ftw" did not get a "Nice one".
ksydfius
Author
26. Sep 2012
lol the answer of "cryptanalysis_ftw" is just the answer you tell me :)
not the input string for the crackme itself

good job btw!
ivvei
26. Sep 2012
e... I still not get your point.
Ok, forget about the "cryptanalysis_ftw", that is what kingdeking wrote and I do not know what does it mean. Maybe it is not important, forget about it....
Back to my queston at #3. I found the JNZ jump caused the programme end task and it seems happen before the input string located at 403264 comparing with the stored string which may be located at 403000. Is this a trap set by your intention and I should not stepped into?
ksydfius
Author
26. Sep 2012
if im understanding you correctly,
the JNZ is just to compare the result of your encrypted text and my encrypted text

so if the one pair of corresponding bytes is not equal, then i will exit the program

if all the bytes are equal, then the JE 401137 is taken

if its still confusing, try debugging it with the correct input key to find out what it does
draww
27. Sep 2012
@ivvei: read 1st crackmes solutions. maybe you'd find out what's going on ;)
RandolphCarter
28. Sep 2012
nice crackme, i enjoyed analyzing it!
NukeCrack
07. Jan 2013
Patched by NukeCrack
Time : 2min

You may leave your comment, thoughts and discuss this crackme with other reversers here.
Acting childish will not be tolerated.
HTML and such will be left as-is, so don't try.