吾爱破解 - 52pojie.cn

 找回密码
 注册[Register]

QQ登录

只需一步,快速开始

查看: 2886|回复: 9
收起左侧

[CrackMe] 开年第一个crackme,希望可以超过72小时!

  [复制链接]
HAINING 发表于 2023-1-29 13:32
CM是什么?Crackme是什么?这是什么东西?楼主发的什么?
他们都是一些公开给别人尝试破解的小程序,制作 Crackme 的人可能是程序员,想测试一下自己的软件保护技术,也可能是一位 Cracker,想挑战一下其它 Cracker 的破解实力,也可能是一些正在学习破解的人,自己编一些小程序给自己破解,KeyGenMe是要求别人做出它的 keygen (序号产生器), ReverseMe 要求别人把它的算法做出逆向分析, UnpackMe 是要求别人把它成功脱壳,本版块禁止回复非技术无关水贴。

本帖最后由 HAINING 于 2023-1-29 13:33 编辑

开年第一个crackme,net代码,希望可以超过72小时!期待大佬出手!标准是:注册成功并出源码,期待能撑过72小时!

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?注册[Register]

x

发帖前要善用论坛搜索功能,那里可能会有你要找的答案或者已经有人发布过相同内容了,请勿重复发帖。

BlackHatRCE 发表于 2023-2-14 16:07

EAFUSCATOR W/ VM + ENIGMA PROTECTOR

I am Unstoppable :D



STEPS -

  • Run the Software and put BP so We can stop it after .NET Data loaded in memory.
  • Perform a memory dump so we will get a file without native layer. (Enigma Protector over .NET only applies Native Layer)
  • I downloaded the File and I see 2 Folders. One Main Target File is protected using "Assembly mode" while another was using "DLL mode".



As You can see, It is properly Unpacked and restored like Original unprotected File.
Difficulty : 9/10




For those who want to learn the process of finding "right key" without unpacking, Follow this -


Steps :
  • Run the software.
  • Open the Process Hacker.
  • Enter anything in the TextBox and It will show an Error.
  • Check for that in Memory Strings and You will find out the Correct Key just near to it or You can inspect the Memory file in Hex Editor.





How To?


Some Public Resource to look for understanding more about EAZ -

  • Strings, Resource and Assembly Embedding - https://github.com/HoLLy-HaCKeR/EazFixer (> It will probably not work on latest version but good to check how It used to work )
  • Symbols Renaming - https://github.com/HoLLy-HaCKeR/EazDecode (> If It is hard for doing then We can guess the name by reading Strings, Types etc. and general pattern present in .NET apps.)
  • EAZ Decode -virtualization is not so easy as It seems.

If there is Homo-morphic Encryption then It is harder even.

  • A good Resource to understand the Devirt process is - https://github.com/saneki/eazdevirt

This challenge does not have homomorphic encryption so no need to brute force the Key and you can continue the Unpacking. For more Info, You can check the Previous solved Challenges of EAZFUSCATOR




If anyone knows English and Chinese both language,
He can translate it properly for everyone.
I do not know Chinese so I can not type in Chinese language (may be I am not smart enough to learn it).



本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?注册[Register]

x

免费评分

参与人数 1吾爱币 +1 热心值 +1 收起 理由
HAINING + 1 + 1 大佬威武!

查看全部评分

darksied 发表于 2023-1-30 16:37
可读性还是不高,没耐心了

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?注册[Register]

x
头像被屏蔽
ccmvd 发表于 2023-1-30 21:41
头像被屏蔽
lxytwp 发表于 2023-1-31 07:59
提示: 该帖被管理员或版主屏蔽
快乐的小跳蛙 发表于 2023-1-31 10:57
darksied 发表于 2023-1-30 16:37
可读性还是不高,没耐心了

怎么脱壳呀
 楼主| HAINING 发表于 2023-2-1 17:25
继续等大佬出手
坏坏小生007 发表于 2023-3-14 08:17
BlackHatRCE 发表于 2023-2-14 16:07
EAFUSCATOR W/ VM + ENIGMA PROTECTOR
I am Unstoppable :D


还是英文的大佬     牛笔666

免费评分

参与人数 1吾爱币 -15 违规 +1 收起 理由
RS水果 -15 + 1 本版块禁止回复与主题无关非技术内容,违者重罚!

查看全部评分

坏坏小生007 发表于 2023-3-19 11:12
坏坏小生007 发表于 2023-3-14 08:17
还是英文的大佬     牛笔666

这也扣   呵呵
头像被屏蔽
cbw779 发表于 2023-3-22 22:44
提示: 该帖被管理员或版主屏蔽
您需要登录后才可以回帖 登录 | 注册[Register]

本版积分规则

返回列表

RSS订阅|小黑屋|处罚记录|联系我们|吾爱破解 - LCG - LSG ( 京ICP备16042023号 | 京公网安备 11010502030087号 )

GMT+8, 2024-12-23 20:20

Powered by Discuz!

Copyright © 2001-2020, Tencent Cloud.

快速回复 返回顶部 返回列表