| View previous topic :: View next topic |
| Author |
Message |
SunBeam I post too much
Reputation: 65
Joined: 25 Feb 2005 Posts: 4023 Location: Romania
|
Posted: Wed Dec 06, 2006 10:32 am Post subject: Hax0r this ! |
|
|
"From Uligor with love". One and the same crack_me, naked and crypted (for the passionate). Try to find the pass ! (and extra, rip the packer & its protection)
|
|
| Back to top |
|
 |
dezuzi Expert Cheater
Reputation: 0
Joined: 09 Aug 2006 Posts: 146 Location: In your washing machine
|
|
| Back to top |
|
 |
Uligor Grandmaster Cheater
Reputation: 0
Joined: 21 Jan 2006 Posts: 956
|
Posted: Wed Dec 06, 2006 10:37 am Post subject: |
|
|
I had that problem too, refresh the page and you'll see it.
You need to FIND the pass btw. and then post/pm it.
_________________
|
|
| Back to top |
|
 |
SXGuy I post too much
Reputation: 0
Joined: 19 Sep 2006 Posts: 3551
|
|
| Back to top |
|
 |
SunBeam I post too much
Reputation: 65
Joined: 25 Feb 2005 Posts: 4023 Location: Romania
|
Posted: Wed Dec 06, 2006 10:47 am Post subject: |
|
|
Am fighting with the packer here. I just ignore the pass finding for now
* EDIT *
Unpacked. Enjoy !
|
|
| Back to top |
|
 |
dezuzi Expert Cheater
Reputation: 0
Joined: 09 Aug 2006 Posts: 146 Location: In your washing machine
|
|
| Back to top |
|
 |
Uligor Grandmaster Cheater
Reputation: 0
Joined: 21 Jan 2006 Posts: 956
|
Posted: Wed Dec 06, 2006 11:55 am Post subject: |
|
|
The key you put in is not E1 D6 5F 2D 6C 31 A0 97.
_________________
|
|
| Back to top |
|
 |
SunBeam I post too much
Reputation: 65
Joined: 25 Feb 2005 Posts: 4023 Location: Romania
|
Posted: Wed Dec 06, 2006 12:03 pm Post subject: |
|
|
@dezuzi:
- u forgot about the null key » 00
- u also forgot about how push/pop work
The key (encrypted, of course - u also forgot that too ) is :
0097A0316C2D5FD6E1
|
|
| Back to top |
|
 |
dezuzi Expert Cheater
Reputation: 0
Joined: 09 Aug 2006 Posts: 146 Location: In your washing machine
|
Posted: Wed Dec 06, 2006 12:14 pm Post subject: |
|
|
i unput some text, 8 bytes
the 8 bytes are encrypted, then compared to E1 D6 5F 2D 6C 31 A0 97
4 bytes at a time, what do you expect me to tell you?
the encryption is easy, let me get back in there and explain
_________________
Give a man a fish; you have fed him for today. Teach a man to fish; and you have fed him for a lifetime.
Dynamic memory is my playground.. |
|
| Back to top |
|
 |
Uligor Grandmaster Cheater
Reputation: 0
Joined: 21 Jan 2006 Posts: 956
|
Posted: Wed Dec 06, 2006 12:18 pm Post subject: |
|
|
| dezuzi wrote: | i unput some text, 8 bytes
the 8 bytes are encrypted, then compared to E1 D6 5F 2D 6C 31 A0 97
4 bytes at a time, what do you expect me to tell you?
the encryption is easy, let me get back in there and explain |
I could make it a simple hash, but you people would never crack it.
If it's such a simple encryption, why don't you decrypt it? :O
_________________
|
|
| Back to top |
|
 |
dezuzi Expert Cheater
Reputation: 0
Joined: 09 Aug 2006 Posts: 146 Location: In your washing machine
|
|
| Back to top |
|
 |
SunBeam I post too much
Reputation: 65
Joined: 25 Feb 2005 Posts: 4023 Location: Romania
|
Posted: Wed Dec 06, 2006 1:03 pm Post subject: |
|
|
If want to do a nice job, do it till the end. Even a donkey can see that it's 4 bytes at a time, but that's not what matters. The encrypted text is pushed to the stack as : E1 D6 5F 2D 6C 31 A0 97 00 and pop-ed backwards. But yeah, go ahead, and explain to me how you break it
Am more than interested. Make sure this time you "spoil" my fun
P.S. : There are 3 keys
|
|
| Back to top |
|
 |
dezuzi Expert Cheater
Reputation: 0
Joined: 09 Aug 2006 Posts: 146 Location: In your washing machine
|
|
| Back to top |
|
 |
SunBeam I post too much
Reputation: 65
Joined: 25 Feb 2005 Posts: 4023 Location: Romania
|
Posted: Wed Dec 06, 2006 1:32 pm Post subject: |
|
|
Yeah, I was referring to the password which is text, not numbers These are always fun and nifty to mess around with. Your idea to revert that algorithm is not bad. Add more to it, and apply it right after the check call and before the "bad_boy" jump You might get the clean text (XOR, ROR, ROL, MOV to static )
|
|
| Back to top |
|
 |
dezuzi Expert Cheater
Reputation: 0
Joined: 09 Aug 2006 Posts: 146 Location: In your washing machine
|
Posted: Wed Dec 06, 2006 6:06 pm Post subject: |
|
|
mmm i gave it another try, this is what i got but it doesnt seem to work
this is the reversed in my eyes, the way it works mind have boggled my mind and made me not see the real way it works but here it is
input is: "aaaabbbb"
[code]mov [00332640],E1D65F2D
mov [00332670],6C31A097
mov esi,[00410008] // 75DFB44F
rol esi,05 // turns esi into 7BAEFDA2
mov ecx,ff852611
ror ecx,06 // ecx is old number of mov ecx,[00410000] (ff852611)
and ecx,esi // changes ECx in something else
mov ebx,00332670
mov eax,00332640
xor [ebx],ecx // xor's bbbb area with ecx
xor [eax],ecx // xor's aaaa area with ecx
not byte ptr [ebx] // does something at bbbb address
xor edi,edi //makes edi 0
mov eax,00332640
mov ebx,00332670
dec eax
dec ebx
lewp:
inc eax //restores original aaaa address
inc ebx // restores original bbbb address
ror byte ptr [eax],03 // rotate eight bits left 3 times of aaaa
rol byte ptr [ebx],07 // rotate eight bits right 7 times of bbbb
inc edi //increases untill 4, all 4 bytes done
cmp edi,04 // if not same goes back to rol and ror
jnge lewp
mov eax,00332640 // aaaa loc
mov ebx,00332670 // bbbb loc
mov ecx,FF852611 //00410000
mov edx,1238AFBD // 00410004
xor [eax],ecx //eax = aaaa location// ecx = FF852611
xor [ebx],edx //ebx = bbbb location// edx = 1238AFBD[/code]
original:
[code]xor [eax],ecx //eax = aaaa location// ecx = FF852611
xor [ebx],edx //ebx = bbbb location// edx = 1238AFBD
dec eax
dec ebx
xor edi,edi //makes edi 0
inc eax //restores original aaaa address
inc ebx // restores original bbbb address
rol byte ptr [eax],03 // rotate eight bits left 3 times of aaaa
ror byte ptr [ebx],07 // rotate eight bits right 7 times of bbbb
inc edi //increases untill 4, all 4 bytes done
cmp edi,04 // if not same goes back to rol and ror
jnge 00401141
mov eax,[ebp-10]
mov ebx,[ebp-18]
not byte ptr [ebx] // does something at bbbb address
mov esi,[00410008] // 75DFB44F
ror esi,05 // turns esi into 7BAEFDA2
rol ecx,06 // ecx is old number of mov ecx,[00410000] (ff852611)
and ecx,esi // changes ECx in something else
xor [ebx],ecx // xor's bbbb area with ecx
xor [eax],ecx // xor's aaaa area with ecx[/code]
i tried my best, the fact that the password is static and pushed onto the stack using pushes makes me confused, since there is no real encryption process for the password, its already embedded into it encrypted
so how could i be sure at all if the password was made the same way the text i type is generated?
_________________
Give a man a fish; you have fed him for today. Teach a man to fish; and you have fed him for a lifetime.
Dynamic memory is my playground.. |
|
| Back to top |
|
 |
|