
mm10121991's CryptoCrackme1
Download Crackme.zip, 27 kb (password: crackmes.de) Browse contents of Crackme.zip hello
Difficulty: 3 - Getting harder | RatingWaiting for at least 3 votes View profile of mm10121991 » |
Solutions
There are no solutions to this crackme yet. Have you solved it? Please write a tutorial and submit it here!
Discussion and comments
mm10121991 Author 30. Nov 2010 | No one is Interested or the crackme is Boring? |
---|---|
hasherezade 01. Dec 2010 | I will try it during weekend, because now I'm busy in my work ;) |
tamaroth Moderator 01. Dec 2010 | I was slightly distracted, but i looked into the code, for me the problem are the equasions, haven't seen anything that uses something like this, so i have to reverse it manually, but only after i finish what i'm doing now. |
KKR_WE_RULE 02. Dec 2010 | I also check'd the code a lil bit, b4 the exam started.. I couldn't find any standard algorithm with uses those kinda equations. But, may be I overlook'd something.. I'll look at it after the exam, ie on 8th.. GoodLuck tamaroth on reversing this :) |
redoC 15. Sep 2012 | Here's the whole algo: ------------------------------------------ MIRACL library functions... IOBASE = 10 var7 = 2 IOBASE = 0x3C = 60 var9 = cinstr ("3348sTq1rpTBoWJ2WiCKoeRMiigcME1VXtAUsfrLUiGx") var10 = cinstr ("4n3NWLri2u1rQ6n0pfMdDfkNGvvp6f5Y31pKNCROTZB") var11 = cinstr ("305cltwcKIVk2gRr77V87eE4qfZwhxhNH52VT4KuhtLl") var6 = cinstr ("1nxZ1wwQ8lIhDGGpYCk0nMqL0JHJjMq0gbgNAEXcxgt5") IOBASE = 256 var8 = cinnum (Name) IOBASE = 0x3C = 60 var12 = cinnum (Serial1) var13 = cinnum (Serial2) var14 = cinnum (Serial3) ------------------------------------------ var1 = pow (Serial3, 2) mod "4n3NWLr..." var2 = pow (var1, 2) mod "4n3NWLr..." var3 = pow (Name, 2) mod "4n3NWLr..." var4 = pow (Serial1, 2) mod "4n3NWLr..." var1 = pow (Serial3, 2) mod "4n3NWLr..." repeated? ------------------------------------------ var1 = var1 * Name mod "4n3NWLr..." var5 = var1 * 2 mod "4n3NWLr..." ------------------------------------------ var2 = pow (Serial1, var2) mod "3348sTq..." var3 = pow (Serial2, var3) mod "3348sTq..." var4 = pow ("1nxZ1...", var4) mod "3348sTq..." var5 = pow ("305clt...", var5) mod "3348sTq..." ------------------------------------------ var2 = var2 * var3 mod "3348sT..." var4 = var4 * var5 mod "3348sT..." ------------------------------------------ Final condition: var2 == var4 ... if you can solve this than you can post solution or write message to me |
You may leave your comment, thoughts and discuss this crackme with other reversers here.
Acting childish will not be tolerated.
HTML and such will be left as-is, so don't try.