Simple crackme Walkthrough
reference | kawaii-flesh's Simple crackme |
Scan with DIE
:
pdf @ main
:
1 | lea rax, qword [var_1a0h] ; rax = address of variable var_1a0h |
I don’t know why r2
doesn’t disassemble this function.
So I use cutter
(still based on r2
..) and ghidra
.
Add several breakpoints, dc
to mov rdx, rax
to finish executing function 0x562911b75179:
Now the program will compare the memory of rax and rdx as shown above in the comments:
proof
Crack the hash online:
- disassemble with
cutter
:
- decompile with
ghidra
: