the hoax's keygenme 2
Download dhx_keygenme_2.zip, 46 kb (password: crackmes.de) Browse contents of dhx_keygenme_2.zip Some crypto, some math, some fun. Have a nice one.
Difficulty: 4 - Needs special knowledge | Send a message to the hoax » View profile of the hoax » |
Solutions
Solution by Encrypto, published 09. jul, 2009; download (247 kb), password: crackmes.de or browse.
Encrypto has rated this crackme as awesome.
Solution by andrewl.us, published 09. jul, 2009; download (42 kb), password: crackmes.de or browse.
andrewl.us has not rated this crackme yet.
Solution by KernelJ, published 09. jul, 2009; download (19 kb), password: crackmes.de or browse.
KernelJ has rated this crackme as quite nice.
Discussion and comments
KernelJ 06. Jul 2009 | finally a new keygen with a difficulty rating above 2 that actually runs. I shall solve it now... |
---|---|
Numernia Moderator 06. Jul 2009 | good one, thanks dihux |
KernelJ 07. Jul 2009 | Well I found the product key. Last block doesn't seem to have much restriction... Still have to do the second part of the keygenme, well the actual keygenme part! |
the hoax Author 07. Jul 2009 | Thank you Numernia |
KernelJ 08. Jul 2009 | The number of valid activation codes has 35 digits. My keygen will (eventually) tell you 100% of these but not all of them. Except it will never be able to tell you that many. lol |
KernelJ 08. Jul 2009 | actually no, it can only be around 16 digits because of one of the restrictions I forgot about. |
KernelJ 08. Jul 2009 | bleh I mean 15 digits... can't count today |
KernelJ 08. Jul 2009 | Sorry base mix up. It is indeed 35 digits. |
Encrypto 09. Jul 2009 | very nice keygenme dihux :) I liked it a lot. I'll post my solution soon :) |
HMX0101 09. Jul 2009 | yea, nice one! I liked it too :P I won't post solution because I'm lazy hehehe :P btw, hi encrypto & numernia :D ltns guys :) |
Encrypto 09. Jul 2009 | hey hmx! ltns indeed man :) where the hell have you been :P dihux a very nice crackme. totally enjoyed it. posted my solution.. dont know if its any good :P my writing skills is about as good as my graphics. :D |
the hoax Author 10. Jul 2009 | Thanks guys. Good solution Encrypto :) |
Encrypto 10. Jul 2009 | thanks mate :) really taught me some stuff :D |
KernelJ 10. Jul 2009 | andrewl'us's solution has some really stupid mistakes in it however... Negation and division are different sir! Well I spent too much time in mine reversing what were clearly library functions, and I could tell because the small loops were nicely dword aligned and code was very efficiently written with no apparent errors... unlike the actual keygenme code! |
simonzack Moderator 11. Jul 2009 | @kernelJ: next time, just use something to scan what the library is and make a sig out of that, or just check out what the results are for the bignum pushed onto the stack generally they are like this: DWORD size INT* contents and mostly bigendian |
KernelJ 11. Jul 2009 | Of course I'd recognize the code easily if I saw it again. And you mean little endian. Who wrote that library anyway? |
andrewl.us Moderator 11. Jul 2009 | you can count on me for stupid mistakes :) it's modified biglib by roy|fleur (like notice how the ExpMod() function has extra flag to instead be CubeMod())...Cauchy's CryptoSig matched most of it if I remember right |
artif 18. Jul 2009 | nice crackme and nice solutions but not only 62119 / FUNNY is valid : there is also 62YB4 / Abjdb, 6xd36 / IAtRn, mJkG2 / hK1A5, wfy94 / hZf35, ERaD3 / wZTx-, OPCh- / Gwiqf, TrF96 / H2aA7 |
artif 18. Jul 2009 | so with that, you multiply again the randomness of the first key, see you |
You may leave your comment, thoughts and discuss this crackme with other reversers here.
Acting childish will not be tolerated.
HTML and such will be left as-is, so don't try.