rcejunk.blogspot.com
RCE junk: [HBK]'s "Indiana Jones and the Wizard of Oz"
http://rcejunk.blogspot.com/2011/04/hbks-indiana-jones-and-wizard-of-oz.html
HBK]'s "Indiana Jones and the Wizard of Oz". Difficulty: 2][protection: Stone Temple Puzzle]. HBK]'s first submissions is a fun and creative crackme. Don't let the difficulty fool you! To gain access to the cave, all the letter 'tablets' must be 'pushed' hmm. no problem for indiana! Http:/ crackmes.de/users/hbk/indiana jones si vrajitorul din oz/. Subscribe to: Post Comments (Atom). Awesome Inc. template. Powered by Blogger.
rcelab.wordpress.com
Unpacking simple ransomware | Welcome to my RCE Lab!
https://rcelab.wordpress.com/2011/03/27/unpacking-simple-ransomware
Just another WordPress.com site. Welcome to my RCE Lab! Laquo; N1ghtm4r3 keygenme 4. Well, I’ve just configured my XP VM under virtualbox, and now I tried to work on some malwares. And here, Xylitol sent me 1 ransomware. Well, it’s kinda easy too unpack, because it’s using upx and mystic compressor. There’s no any import redirection, or any anti dumping tricks, so you can easily dump it via ollydmp and fix imports via ImportRec. So it’s easy packer. You can leave a response. From your own site. You are c...
rcejunk.blogspot.com
RCE junk: One Hell of an Anti-Debug! HideFromDebugger
http://rcejunk.blogspot.com/2010/10/one-hell-of-anti-debug.html
One Hell of an Anti-Debug! A target appears to have no protection whatsoever, allowing debug attach, stepping, breakpoint, etc. When a critical area is reached, however, the debugger seems to not work at all - the breakpoint instruction and single-step exceptions (C0000003, C0000004) get passed right over the debugger and to the target, where it displays an error message. Checked windbg on another machine, then olly - all tests exhibit same behavior. KiTrap03 before and after the protection, no changes.
rcejunk.blogspot.com
RCE junk: Numernia's "Keygenme Tre"
http://rcejunk.blogspot.com/2010/01/numernias-keygenme-tre.html
Difficulty: 4][protection: 0xECC9 :)]. Check out Numernia's new crackme at http:/ crackmes.de/users/numernia/keygenme tre/. Probably a little more difficult than 4, but totally possible! Subscribe to: Post Comments (Atom). Awesome Inc. template. Powered by Blogger.
rcejunk.blogspot.com
RCE junk: Shmoocon 2011 Crypto Challenge Pack
http://rcejunk.blogspot.com/2011/02/shmoocon-2011-crypto-challenge-pack.html
Shmoocon 2011 Crypto Challenge Pack. The Ghost In The Shellcode organizers gave me the privilege again this year to write some challenges for their CTF event. Here are the contents of the README:. Shmoocon 2011 Cryptography Challenge Pack. Http:/ www.ghostintheshellcode.com/. Https:/ www.shmoocon.org/ghost in the shellcode. These are the cryptography challenges submitted to the Shmoocon 2011 "Ghost In. The Shellcode" organizers for potential use in the CTF event and December. Values between external tools.
rcejunk.blogspot.com
RCE junk: Shmoocon 2010 Crypto Challenge Pack
http://rcejunk.blogspot.com/2010/02/shmoocon-2010-crypto-challenge-pack.html
Shmoocon 2010 Crypto Challenge Pack. These are the crypto challenges from Shmoocon 2010's "Ghost in The Shellcode" CTF event (see http:/ www.shmoocon.org/gits.html). My goal was to make algos that can be grasped quickly (minimal reversing), but remain challenging to keygen. Example codes are given in each respective crackmes' GUI. As always, true keygens are the only real solutions :). Http:/ crackmes.de/users/andrewl.us/shmoocon 2010 crypto challenge pack/. Subscribe to: Post Comments (Atom).
rcejunk.blogspot.com
RCE junk: Conjan's "Jump Around"
http://rcejunk.blogspot.com/2010/05/conjans-jump-around.html
Difficulty: 3][protection: mild asm obfuscation, trigonometry equation]. The serial verification function's instructions are reordered and linked with unconditional jumps. The solution shows how to disassemble the code into a linked list of instructions, remove the jumps, and recover the original code. Subscribe to: Post Comments (Atom). Awesome Inc. template. Powered by Blogger.
rcejunk.blogspot.com
RCE junk: gbe32241's SDDecoder
http://rcejunk.blogspot.com/2010/01/sddecoder-solved.html
I'm pleased to report that after nearly half a year of obsession, SDDecoder is solved. It is one of the most enigmatic crackmes posted to crackmes.de IMHO. My attack should work in general for any overlapping s-box scheme. The first implementation was made against SDD64 (the very reason SDD64 was written! Jan 13th, 2010 EDIT. Jan 27th, 2010 EDIT: Not challenged enough? See how SDDecoder (DRegZ) was built, and try JRegZ and QRegZ at http:/ www.webalice.it/giuliano.bertoletti/lca.html.
rcejunk.blogspot.com
RCE junk: MR.HAANDI's "Intersection #1.0"
http://rcejunk.blogspot.com/2010/03/mrhaandis-intersection-10.html
MRHAANDI's "Intersection #1.0". It's compiled against NTL and *alot* of code has to be sifted through to understand what is going on. It's a custom scheme:. Now a cubic equation arises because of the serial's exponent. The equation is reduced mod #E, which is composite. So it doesn't always have solutions. But you can produce many variations of the equation (one which hopefully DOES have a solution) by carefully tweaking the coefficient on the X 0 term. Http:/ en.wikipedia.org/wiki/Jacobian curve.
SOCIAL ENGAGEMENT