
qfqe's crackme 0x01 by qfqe
Download crkm0x1.zip, 1736 kb (password: crackmes.de) Browse contents of crkm0x1.zip It's very easy.
Difficulty: 2 - Needs a little brain (or luck) | RatingWaiting for at least 3 votes View profile of qfqe » |
Solutions
Solution by GUAN DE DIO, published 19. mar, 2009; download (214 kb), password: crackmes.de or browse.
GUAN DE DIO has not rated this crackme yet.
Discussion and comments
xrem 17. Dec 2008 | Is patching allowed? |
---|---|
aout 17. Dec 2008 | FYI: Just because you may have used an easy algorithm, this is not an easy crackme. Reversing py2exe'd files is complex. First we have to understand how/where the Python byte code is stored, then extract it and eventually decompile the byte code back to Python code. |
synak 22. Dec 2008 | bytecode is stored in the resource section of the exe, version python 2.6 i believe. unfortunately no free decompilers to handle 2.6.. also, appears that py2exe mangles python's magic number (first bytes of the pyc embedded in the resource section).. |
aout 23. Dec 2008 | Yeah I know it's stored in a ressource, I read the py2exe source, but I didn't quite get if it's one file or many or whatever. Searching for zip signatures in the dumped resource file gives you a good handful of 320 hits. py2exe seems to concatenate each zipped pyc file or something like that. Altogether way harder than the author thought it to be ;) |
You may leave your comment, thoughts and discuss this crackme with other reversers here.
Acting childish will not be tolerated.
HTML and such will be left as-is, so don't try.