Simple crackme Walkthrough
reference | kawaii-flesh's Simple crackme |
Scan with DIE
:

pdf @ main
:

1 | lea rax, qword [var_1a0h] ; rax = address of variable var_1a0h |
I don’t know why r2
doesn’t disassemble this function.
So I use cutter
(still based on r2
..) and ghidra
.
Add several breakpoints, dc
to mov rdx, rax
to finish executing function 0x562911b75179:

Now the program will compare the memory of rax and rdx as shown above in the comments:

proof

Crack the hash online:

- disassemble with
cutter
:

- decompile with
ghidra
:
