downloadbrowseReWrit's ReWrit's Crackme#2

Download ReWrit__s_Crackme#2.zip, 312 kb (password: crackmes.de)
Browse contents of ReWrit__s_Crackme#2.zip

ReWrit's Crackme#2


This is my second Crackme, i hope its a bit harden then
the first one. =P
---------------


patch it so the correct password will
be visible (check the picture in zip file)
and upload a solution.

Difficulty: 1 - Very easy, for newbies
Platform: Windows
Language: C/C++

Published: 01. Oct, 2008
Downloads: 1079

Rating

Votes: 5
Crackme is quite nice.

Rate this crackme:

Send a message to ReWrit »

View profile of ReWrit »

Solutions

Solution by main, published 05. oct, 2008; download (298 kb), password: crackmes.de or browse.

main has rated this crackme as quite nice.

Solution by JoKa, published 03. oct, 2008; download (296 kb), password: crackmes.de or browse.

JoKa has rated this crackme as quite nice.

Submit your solution »

Discussion and comments

main
01. Oct 2008
It´s indeed very easy to find the password, but not _very_ easy to actually implement it. Btw: du är från sverige alltså?
ReWrit
Author
02. Oct 2008
japp jag är från Sverige
main
02. Oct 2008
I´ve solved it now. A nice crackme. But I don´t think it´s a level 1, more like level 2 if you compare with other crackmes (spelar ju iofs ingen roll, men ändå).

Thanks anyway swedish friend! :)
main
02. Oct 2008
Testa förresten min VBCrackme om du vågar dig in på VBs outgrundliga vägar! :P
zairon
Moderator
03. Oct 2008
[Only english here...]
main
03. Oct 2008
Oh, yes, sorry. Only english from now on!
main
03. Oct 2008
I solved this by importing printf with LordPE.
cli3nt
03. Dec 2008
Well, if someone need to patch something to see something then simply replacing jnz is quicker and give us same result.
windowbase
24. Mar 2009
I could not understand JoKa's solution. ^^
0043F103 |. 8BCC MOV ECX,ESP
0043F105 |. 83C1 E0 ADD ECX,-20
0043F108 |. 894C24 0C MOV DWORD PTR SS:[ESP+C],ECX ; sets argument for call at 401A09

why "ADD ECX,-20" & "MOV DWORD PTR SS:[ESP+C],ECX" must be written, and

0043F189 |> 66:83F8 64 /CMP AX,64
0043F18D |. 7C 07 |JL SHORT cr7.0043F196
0043F18F |. 66:83E8 64 |SUB AX,64
0043F193 |. 43 |INC EBX
0043F194 |.^EB F3 \JMP SHORT cr7.0043F189
0043F196 |> 41 INC ECX
0043F197 |. 8819 MOV BYTE PTR DS:[ECX],BL
0043F199 |. B3 30 MOV BL,30
0043F19B |> 3C 0A /CMP AL,0A
0043F19D |. 7C 05 |JL SHORT cr7.0043F1A4
0043F19F |. 2C 0A |SUB AL,0A
0043F1A1 |. 43 |INC EBX
0043F1A2 |.^EB F7 \JMP SHORT cr7.0043F19B
0043F1A4 |> 41 INC ECX
0043F1A5 |. 8819 MOV BYTE PTR DS:[ECX],BL
0043F1A7 |. B3 30 MOV BL,30

why 'AX' is changed to 'AL' suddenly? ^^

and why "MOV BL,30" must be written?

Could anybody explain it to me kindly?

JoKa ~ Can you hear me? ^^

Kind Regards.
breakpoint
21. Jun 2009
@main: why did u use LordPE, printf was already imported?

kul crackme, bra jobbat!

You may leave your comment, thoughts and discuss this crackme with other reversers here.
Acting childish will not be tolerated.
HTML and such will be left as-is, so don't try.