Compare commits

...

2 Commits

Author SHA1 Message Date
ea7656f19f
solved new crackme 2024-09-19 16:09:17 +08:00
fb331a0605
solved new crackme 2024-09-19 13:13:44 +08:00
6 changed files with 91 additions and 0 deletions

Binary file not shown.

52
ac_crackme_2.78/solve.txt Normal file
View File

@ -0,0 +1,52 @@
代码量不大ida一眼可见密码
"aCiDrOcK"
手动的话看下面:
00401005 | E9 06000000 | jmp crackme2.401010 |
......
00401010 | 55 | push ebp |
00401011 | 8BEC | mov ebp,esp |
00401013 | 83EC 48 | sub esp,48 |
00401016 | 53 | push ebx |
00401017 | 56 | push esi |
00401018 | 57 | push edi |
00401019 | 8D7D B8 | lea edi,dword ptr ss:[ebp-48] |
0040101C | B9 12000000 | mov ecx,12 | ecx:"aCiDrOcK"
00401021 | B8 CCCCCCCC | mov eax,CCCCCCCC |
00401026 | F3:AB | rep stosd |
00401028 | 68 68204200 | push crackme2.422068 | 422068:"This cracme is coded by Acid_Cool_178 and The Bug Tracker\n"
0040102D | E8 7E010000 | call crackme2.4011B0 |
00401032 | 83C4 04 | add esp,4 |
00401035 | 68 4C204200 | push crackme2.42204C | 42204C:"Please write the code:"
0040103A | E8 71010000 | call crackme2.4011B0 |
0040103F | 83C4 04 | add esp,4 |
00401042 | 8D45 F8 | lea eax,dword ptr ss:[ebp-8] | ebp-8: 存储用户输入值
00401045 | 50 | push eax |
00401046 | 68 48204200 | push crackme2.422048 | 422048:"%8s"
0040104B | E8 00010000 | call crackme2.401150 | 用户输入
00401050 | 83C4 08 | add esp,8 |
00401053 | 68 3C204200 | push crackme2.42203C | 42203C:"aCiDrOcK" <---
00401058 | 8D4D F8 | lea ecx,dword ptr ss:[ebp-8] |
0040105B | 51 | push ecx | 用户输入值
0040105C | E8 5F000000 | call crackme2.4010C0 | _strcmp
00401061 | 83C4 08 | add esp,8 |
00401064 | 85C0 | test eax,eax | 检查core
00401066 | 75 0F | jne <crackme2.FailCheck> |
00401068 | 68 2C204200 | push crackme2.42202C | 42202C:"\tYoU dId It\n"
0040106D | E8 3E010000 | call crackme2.4011B0 |
00401072 | 83C4 04 | add esp,4 |
00401075 | EB 0D | jmp crackme2.401084 |
00401077 | 68 1C204200 | push crackme2.42201C | 42201C:"\tYoU fAiLeD\n"
0040107C | E8 2F010000 | call crackme2.4011B0 |
00401081 | 83C4 04 | add esp,4 |
00401084 | 5F | pop edi |
00401085 | 5E | pop esi |
00401086 | 5B | pop ebx |
00401087 | 83C4 48 | add esp,48 |
0040108A | 3BEC | cmp ebp,esp |
0040108C | E8 9F010000 | call crackme2.401230 |
00401091 | 8BE5 | mov esp,ebp |
00401093 | 5D | pop ebp |
00401094 | C3 | ret |

Binary file not shown.

Binary file not shown.

View File

@ -0,0 +1,4 @@
The rules are easy, use whatever you want. But you MUST send me the tutorial!!
acid_cool_178@hotmail.com

35
ac_crackme_3.78/solve.txt Normal file
View File

@ -0,0 +1,35 @@
VBDec & VB Decompiler
p-code
Name: AcidHell
Code: 5843
402810 Form1.Form_Load:
402810 27 FCFE LitVar_Missing var_104 <--Patch here
402813 27 1CFF LitVar_Missing var_E4
402816 3A 4CFF0A00 LitVarStr var_B4 str_402284='[AC_178] And [TBT] Crackme3'
40281B 4E 3CFF FStVarCopyObj var_C4
40281E 04 3CFF FLdRfVar var_C4
402810 Form1.Proc_402810:
402810 1E 3100 Branch loc_402841 // go to 402841
402813 27 1CFF LitVar_Missing var_E4
402816 3A 4CFF0A00 LitVarStr var_B4 str_402284='[AC_178] And [TBT] Crackme3'
40281B 4E 3CFF FStVarCopyObj var_C4
40281E 04 3CFF FLdRfVar var_C4
402821 F5 10000000 LitI4 0x10
402826 3A 6CFF0B00 LitVarStr var_94 str_4021B0='This is a NAG screen to our great RV friends, Please remove me first before you are cracking my code..'
40282B 4E 5CFF FStVarCopyObj var_A4
40282E 04 5CFF FLdRfVar var_A4
402831 0A 05001400 ImpAdCallFPR4 rtcMsgBox
402836 36 0800 [8 bytes] FFreeVar var_A4 var_C4 var_E4 var_104
402841 27 6CFF LitVar_Missing var_94
loc_402744: var_10C = ("AcidHell" = CVar(Me.Text1.Text)) And ("5843" = CVar(Me.Text2.Text))
loc_40274A: If CBool(var_10C) Then
loc_40276E: MsgBox("I am tha Ruler og the World", &H40, "Congratulations", var_10C, var_14C)
loc_40277E: End
loc_402783: Else
loc_4027A4: MsgBox("Try again", &H30, "Not god enough", var_10C, var_14C)
loc_4027B4: End If