downloadbrowsethe hoax's keygenme 2

Download dhx_keygenme_2.zip, 46 kb (password: crackmes.de)
Browse contents of dhx_keygenme_2.zip

Some crypto, some math, some fun. Have a nice one.

- dihux // 2009

Difficulty: 4 - Needs special knowledge
Platform: Windows 2000/XP only
Language: Assembler

Published: 06. Jul, 2009
Downloads: 588

Rating

Votes: 6
Crackme is quite nice.

Rate this crackme:

Send a message to the hoax »

View profile of the hoax »

Solutions

Solution by Encrypto, published 09. jul, 2009; download (247 kb), password: crackmes.de or browse.

Encrypto has rated this crackme as awesome.

Solution by andrewl.us, published 09. jul, 2009; download (42 kb), password: crackmes.de or browse.

andrewl.us has not rated this crackme yet.

Solution by KernelJ, published 09. jul, 2009; download (19 kb), password: crackmes.de or browse.

KernelJ has rated this crackme as quite nice.

Submit your solution »

Discussion and comments

KernelJ
06. Jul 2009
finally a new keygen with a difficulty rating above 2 that actually runs. I shall solve it now...
Numernia
Moderator
06. Jul 2009
good one, thanks dihux
KernelJ
07. Jul 2009
Well I found the product key. Last block doesn't seem to have much restriction... Still have to do the second part of the keygenme, well the actual keygenme part!
the hoax
Author
07. Jul 2009
Thank you Numernia
KernelJ
08. Jul 2009
The number of valid activation codes has 35 digits. My keygen will (eventually) tell you 100% of these but not all of them. Except it will never be able to tell you that many. lol
KernelJ
08. Jul 2009
actually no, it can only be around 16 digits because of one of the restrictions I forgot about.
KernelJ
08. Jul 2009
bleh I mean 15 digits... can't count today
KernelJ
08. Jul 2009
Sorry base mix up. It is indeed 35 digits.
Encrypto
09. Jul 2009
very nice keygenme dihux :) I liked it a lot. I'll post my solution soon :)
HMX0101
09. Jul 2009
yea, nice one! I liked it too :P
I won't post solution because I'm lazy hehehe :P

btw, hi encrypto & numernia :D
ltns guys :)
Encrypto
09. Jul 2009
hey hmx! ltns indeed man :) where the hell have you been :P

dihux a very nice crackme. totally enjoyed it. posted my solution.. dont know if its any good :P my writing skills is about as good as my graphics. :D
the hoax
Author
10. Jul 2009
Thanks guys. Good solution Encrypto :)
Encrypto
10. Jul 2009
thanks mate :) really taught me some stuff :D
KernelJ
10. Jul 2009
andrewl'us's solution has some really stupid mistakes in it however... Negation and division are different sir! Well I spent too much time in mine reversing what were clearly library functions, and I could tell because the small loops were nicely dword aligned and code was very efficiently written with no apparent errors... unlike the actual keygenme code!
simonzack
Moderator
11. Jul 2009
@kernelJ: next time, just use something to scan what the library is and make a sig out of that, or just check out what the results are for the bignum pushed onto the stack
generally they are like this:
DWORD size
INT* contents
and mostly bigendian
KernelJ
11. Jul 2009
Of course I'd recognize the code easily if I saw it again. And you mean little endian. Who wrote that library anyway?
andrewl.us
Moderator
11. Jul 2009
you can count on me for stupid mistakes :)

it's modified biglib by roy|fleur (like notice how the ExpMod() function has extra flag to instead be CubeMod())...Cauchy's CryptoSig matched most of it if I remember right
artif
18. Jul 2009
nice crackme and nice solutions but not only 62119 / FUNNY is valid : there is also 62YB4 / Abjdb, 6xd36 / IAtRn, mJkG2 / hK1A5, wfy94 / hZf35, ERaD3 / wZTx-, OPCh- / Gwiqf, TrF96 / H2aA7
artif
18. Jul 2009
so with that, you multiply again the randomness of the first key, see you

You may leave your comment, thoughts and discuss this crackme with other reversers here.
Acting childish will not be tolerated.
HTML and such will be left as-is, so don't try.