downloadbrowsepromix17's MazeJumps by Promix17

Download MazeJumps.zip, 6 kb (password: crackmes.de)
Browse contents of MazeJumps.zip

MazeJumps v1.0
Written by Promix17

Level of dufficulty: 3/10

The goal is to register this program with the keyfile.

This crackme has unusual code structure. Hope you will like it.

Good luck)))

Difficulty: 3 - Getting harder
Platform: Windows
Language: Assembler

Published: 03. Jan, 2013
Downloads: 295

Rating

Votes: 5
Crackme is quite nice.

Rate this crackme:

Send a message to promix17 »

View profile of promix17 »

Solutions

Solution by SFeS, published 20. mar, 2013; download (424 kb), password: crackmes.de or browse.

SFeS has not rated this crackme yet.

Solution by zairon, published 22. jan, 2013; download (7 kb), password: crackmes.de or browse.

zairon has not rated this crackme yet.

Solution by bike, published 09. jan, 2013; download (3 kb), password: crackmes.de or browse.

bike has rated this crackme as quite nice.

Solution by ForFun, published 09. jan, 2013; download (2 kb), password: crackmes.de or browse.

ForFun has rated this crackme as nothing special.

The submission of solutions is closed.

Discussion and comments

3ton
05. Jan 2013
key.txt
Hello wor1d!
idid231
08. Jan 2013
Mov,Xor, ECX, EDX.. i don't know how to jump direct and remove un-use code. If we follow jump by jump command we must spend pretty much time to reverse longer code, not good.
3ton
08. Jan 2013
KEY DB "********r1d!",0

MOV EAX DWORD PTR [KEY]
MOV ECX DWORD PTR [KEY+4]
XOR EAX, 0F45A675Dh
XOR ECX, 04DDAFA31h
ADD EAX, ECX
CMP EAX, 0BAE3DC73h

MOV EAX DWORD PTR [KEY]
MOV ECX DWORD PTR [KEY+4]
XOR EAX, 0AADD357Dh
XOR ECX, 044FAFC3Ch
ADD EAX,ECX
CMP EAX,0F23F2C88h

MOV EBX, DWORD [KEY+8]
CMP EBX,21643172h ;"r1d!"
idid231
08. Jan 2013
I knew its algorithm. I just don't know how to split it out from junk codes. Tell me how did you do 3ton, please.
demoth
08. Jan 2013
I written a little program for deobfuscate this crackme.
You can see deobfuscated crackmes here:
http://rghost.ru/42840075
demoth
08. Jan 2013
3ton, how you understand what
MOV EAX DWORD PTR [KEY]
MOV ECX DWORD PTR [KEY+4]
XOR EAX, 0F45A675Dh
XOR ECX, 04DDAFA31h
ADD EAX, ECX
CMP EAX, 0BAE3DC73h

MOV EAX DWORD PTR [KEY]
MOV ECX DWORD PTR [KEY+4]
XOR EAX, 0AADD357Dh
XOR ECX, 044FAFC3Ch
ADD EAX,ECX
CMP EAX,0F23F2C88h

it is checking "Hello wo"? Just guessed?
demoth
08. Jan 2013
Mmm... I'm idiot.
There are many collisions, for example:
HelDo wG
JetLm oO
HOlLoNwO
JGldmFwg
etc.
But message is incorrect for them.
idid231
09. Jan 2013
hi demoth, can i have your source of deobf program? I need your ideal to know how to debof this crackme.
andrewl.us
Moderator
09. Jan 2013
two solutions accepted, and neither uses a deobfuscator that emits a cleaner crackmer

demoth, submit a solution with your deobfuscator!
ForFun
09. Jan 2013
@bike: Excellent tut !!
3ton
26. Jan 2013
My script for deobfucate crackme. http://rghost.ru/43327252
idid231
27. Jan 2013
Thank you guys for the excellence tut and scripts.
kiTo
08. Apr 2013
3ton: Why post the answer without a solution? Thats just plain stupid.
"Check me out, I know the answer but will not share!"

You may leave your comment, thoughts and discuss this crackme with other reversers here.
Acting childish will not be tolerated.
HTML and such will be left as-is, so don't try.