RodrigoTeixeira's Very easy disassembly execise
MD5: 8483be5dfef09fb44dd14cec54c56a80
SHA1: fe71c366051bbe25e0e755b92008364ab149f474
SHA256: 72cb9e317be02bd73b93e80de9f07d29234948e09bf658058691460e504f0d4c
This is listed as a C/C++ x64 executable with a difficulty rating of 1.0. The author is RodrigoTeixeira and the executable is written for Windows.
The authors description:
Retreive a hard coded int from the executable. Good luck.
I'm not feeling well today but my goal for the month is to solve a crackme everyday so I chose an easy one to knock out.
The description lists this as an x64 application but DIE tells us that it's actually x86. It does not appear to be packed. The author used MingGW to compile the console application.
Taking a look at the strings we can see what can be assumed to be the prompt and good boy. We also get an indication that the author may have compiled the executable using Cygwin. Their real name might be Keith.
Detect it easy found signatures that caused it to determine that this was written using C/C++ but I think it may have been written using ASM. It's extremely bare. The defaults make it clear what the password should be. The initial prompt is referenced using .rdata. There isn't even a prompt to let you know that you entered the incorrect password.
The way arguments are being passed to functions is also really strange. The stack space is being allocated up front and then different arguments are being move directly to the top of the stack. But anyways.
Here's my edited version.
Thank you to the creator for the challenge. If you happen to find this, could you let me know if I'm correct that this was written in assembly.
Comments
Post a Comment