Jump to content
Tuts 4 You

Forums

  1. Community Links

    1. Terms, Privacy Policy & Frequently Asked Questions   (253,218 visits to this link)

      Very important! Please read before sign up and posting...

  2. Community Discussions

    1. Site Bug Reports and Feedback

      Bugs, feedback and ideas regarding this site...

      2.3k
      posts
  3. Developers Forums

    1. Programming and Coding

      Programming and coding tips, help and solutions...

      12.7k
      posts
    2. Programming Resources

      Share an interesting blog, news page or other resource...

      437
      posts
    3. Software Security

      Securing your software against reverse engineering...

      932
      posts
  4. Reverse Code Engineering

    1. Challenge of Reverse Engineering

      Try a challenge or contribute your own, any platform or operating system...

      14.6k
      posts
    2. Hardware Reverse Engineering

      Reverse engineering of circuitry hardware and firmware...

      241
      posts
    3. Network Security

      Discussions on network security, holes, exploits and other issues...

      452
      posts
    4. Malware Reverse Engineering

      Debugging, disassembling and documenting interesting malware...

      1.7k
      posts
    5. Reverse Engineering Articles

      Share an interesting blog, news page or other RE related site...

      2.5k
      posts
    6. Employment and Careers

      Discussions on employment and career paths in the industry...

      197
      posts
  5. Community Projects

    1. Scylla Imports Reconstruction

      Development and support forum for the Scylla project...

      506
      posts
    2. x64dbg

      An open-source x64/x32 debugger for windows...

      1.3k
      posts
    3. Future Community Projects

      Looking for support and interested partners for a future project?

      148
      posts
    4. Community Projects Archive

      Old and inactive projects moved to long term support...

      822
      posts
  • Member Statistics

    26,415
    Total Members
    7,713
    Most Online
    yavuze00
    Newest Member
    yavuze00
    Joined
  • Posts

    • extonoxt
      Excellent write-up. It is complete  and easy to understand. Thank you
    • H1TC43R
    • CodeExplorer
      On the 000000014000838B 0, 1, 2, 3  8, 9, A, B, C, D, 6, 7 - 0000000140008BD4   | 8B4424 20   | mov eax,dword ptr ss:[rsp+20] 0000000140008BD8   | FFC0        | inc eax           0000000140008BDA   | 894424 20   | mov dword ptr ss:[rsp+20],eax 0000000140008BDE   | E9 07070000 | jmp crackme123.1400092EA   0000000140008A16   | 8B4424 30               | mov eax,dword ptr ss:[rsp+30]     | 0000000140008A1A   | FFC0                    | inc eax  | 0000000140008A1C   | 894424 30               | mov dword ptr ss:[rsp+30],eax  | 0000000140008A20   | 837C24 30 04            | cmp dword ptr ss:[rsp+30],4   | 0000000140008A25   | 0F8D A9010000           | jge crackme123.140008BD4       | 0000000140008A2B   | 8B4424 24               | mov eax,dword ptr ss:[rsp+24]   | 0000000140008A2F   | 99                      | cdq   | 0000000140008A30   | 83E2 03                 | and edx,3 | 0000000140008A33   | 03C2                    | add eax,edx  | 0000000140008A35   | 83E0 03                 | and eax,3     | 0000000140008A38   | 2BC2                    | sub eax,edx  | 0000000140008A3A   | 898424 80000000         | mov dword ptr ss:[rsp+80],eax   | 0000000140008A41   | 83BC24 80000000 00      | cmp dword ptr ss:[rsp+80],0    | 0000000140008A49   | 74 2B                   | je crackme123.140008A76  | 0000000140008A4B   | 83BC24 80000000 01      | cmp dword ptr ss:[rsp+80],1  | 0000000140008A53   | 74 60                   | je crackme123.140008AB5    | 0000000140008A55   | 83BC24 80000000 02      | cmp dword ptr ss:[rsp+80],2    | 0000000140008A5D   | 0F84 90000000           | je crackme123.140008AF3   | 0000000140008A63   | 83BC24 80000000 03      | cmp dword ptr ss:[rsp+80],3   | 0000000140008A6B   | 0F84 C3000000           | je crackme123.140008B34    | 0000000140008A71   | E9 0B010000             | jmp crackme123.140008B81   | 0000000140008A76   | 8B4424 30               | mov eax,dword ptr ss:[rsp+30]  | 0000000140008A7A   | D1E0                    | shl eax,1  | 0000000140008A7C   | 48:98                   | cdqe  | 0000000140008A7E   | 48:898424 E8010000      | mov qword ptr ss:[rsp+1E8],rax   | 0000000140008A86   | 48:8D8C24 98000000      | lea rcx,qword ptr ss:[rsp+98] | 0000000140008A8E   | E8 0DEDFFFF             | call crackme123.1400077A0    | so I don't any idea where the password test is made...  
    • CodeExplorer
      It is 64 bit file, so I load the file in x64dbg print Incorrect password: 000000014000593E   | E8 FDBCFFFF   | call crackme123.140001640  | 0000000140005943   | 48:894424 48  | mov qword ptr ss:[rsp+48],rax | 0000000140005948   | 48:8D15 81CFF | lea rdx,qword ptr ds:[1400028D0] | 000000014000594F   | 48:8B4C24 48  | mov rcx,qword ptr ss:[rsp+48]    | 0000000140005954   | E8 97E4FFFF   | call crackme123.140003DF0        | 0000000140005959   | 48:83C4 78    | add rsp,78        | 000000014000595D   | C3            | ret                   | called from here: 000000014000838B   | 8B4424 20     | mov eax,dword ptr ss:[rsp+20]    | 000000014000838F   | 898424 B80000 | mov dword ptr ss:[rsp+B8],eax    | 0000000140008396   | 83BC24 B80000 | cmp dword ptr ss:[rsp+B8],31     | 31:'1' 000000014000839E   | 0F87 3C0F0000 | ja crackme123.1400092E0          | 00000001400083A4   | 48:638424 B80 | movsxd rax,dword ptr ss:[rsp+B8] | 00000001400083AC   | 48:8D0D 4D7CF | lea rcx,qword ptr ds:[140000000] | 00000001400083B3   | 8B8481 B09300 | mov eax,dword ptr ds:[rcx+rax*4+93B0]     | 00000001400083BA   | 48:03C1       | add rax,rcx    | 00000001400083BD   | FFE0          | jmp rax      | but I don't know which is proper valid value of dword ptr ss:[rsp+B8]  
    • casualPerson
      View File crackme123 A "Crack Me" challenge created by lord "Voksi" , a well known person in the "warez" scene.  And no, this challenge is not uploaded by "Voksi" himself, it's uploaded via a proxy which is myself, an old friend of "Voksi" . GOAL: Obtain the Correct key  Greetings to MasterBootRecord, Voksi, FJLJ, And also a few others, you know who you are ❤️ Submitter casualPerson Submitted 07/04/2025 Category CrackMe  
  • Popular Contributors

    1. 1
      CodeExplorer
      CodeExplorer
      39
    2. 2
      jackyjask
      jackyjask
      26
    3. 3
      extonoxt
      extonoxt
      10
    4. 4
      H1TC43R
      H1TC43R
      7
    5. 5
      whoknows
      whoknows
      7
  • Files

  • File Comments

  • Tell a friend

    Love Tuts 4 You? Tell a friend!
×
×
  • Create New...