
ReWrit's ReWrit's Crackme#2
Download ReWrit__s_Crackme#2.zip, 312 kb (password: crackmes.de) Browse contents of ReWrit__s_Crackme#2.zip ReWrit's Crackme#2
Difficulty: 1 - Very easy, for newbies | Send a message to ReWrit » View profile of ReWrit » |
Solutions
Solution by main, published 05. oct, 2008; download (298 kb), password: crackmes.de or browse.
main has rated this crackme as quite nice.
Solution by JoKa, published 03. oct, 2008; download (296 kb), password: crackmes.de or browse.
JoKa has rated this crackme as quite nice.
Discussion and comments
main 01. Oct 2008 | It´s indeed very easy to find the password, but not _very_ easy to actually implement it. Btw: du är från sverige alltså? |
---|---|
ReWrit Author 02. Oct 2008 | japp jag är från Sverige |
main 02. Oct 2008 | I´ve solved it now. A nice crackme. But I don´t think it´s a level 1, more like level 2 if you compare with other crackmes (spelar ju iofs ingen roll, men ändå). Thanks anyway swedish friend! :) |
main 02. Oct 2008 | Testa förresten min VBCrackme om du vågar dig in på VBs outgrundliga vägar! :P |
zairon Moderator 03. Oct 2008 | [Only english here...] |
main 03. Oct 2008 | Oh, yes, sorry. Only english from now on! |
main 03. Oct 2008 | I solved this by importing printf with LordPE. |
cli3nt 03. Dec 2008 | Well, if someone need to patch something to see something then simply replacing jnz is quicker and give us same result. |
windowbase 24. Mar 2009 | I could not understand JoKa's solution. ^^ 0043F103 |. 8BCC MOV ECX,ESP 0043F105 |. 83C1 E0 ADD ECX,-20 0043F108 |. 894C24 0C MOV DWORD PTR SS:[ESP+C],ECX ; sets argument for call at 401A09 why "ADD ECX,-20" & "MOV DWORD PTR SS:[ESP+C],ECX" must be written, and 0043F189 |> 66:83F8 64 /CMP AX,64 0043F18D |. 7C 07 |JL SHORT cr7.0043F196 0043F18F |. 66:83E8 64 |SUB AX,64 0043F193 |. 43 |INC EBX 0043F194 |.^EB F3 \JMP SHORT cr7.0043F189 0043F196 |> 41 INC ECX 0043F197 |. 8819 MOV BYTE PTR DS:[ECX],BL 0043F199 |. B3 30 MOV BL,30 0043F19B |> 3C 0A /CMP AL,0A 0043F19D |. 7C 05 |JL SHORT cr7.0043F1A4 0043F19F |. 2C 0A |SUB AL,0A 0043F1A1 |. 43 |INC EBX 0043F1A2 |.^EB F7 \JMP SHORT cr7.0043F19B 0043F1A4 |> 41 INC ECX 0043F1A5 |. 8819 MOV BYTE PTR DS:[ECX],BL 0043F1A7 |. B3 30 MOV BL,30 why 'AX' is changed to 'AL' suddenly? ^^ and why "MOV BL,30" must be written? Could anybody explain it to me kindly? JoKa ~ Can you hear me? ^^ Kind Regards. |
breakpoint 21. Jun 2009 | @main: why did u use LordPE, printf was already imported? kul crackme, bra jobbat! |
You may leave your comment, thoughts and discuss this crackme with other reversers here.
Acting childish will not be tolerated.
HTML and such will be left as-is, so don't try.