Reverse learning crackme160 question-010-ceycey's write up

010-ceycey 的 write up

1. Execution of program

When we first opened the software input box, we were prompted to write it here!! :P We casually entered a string of passwords and clicked check, but nothing happened. Then we looked at the relevant information about the software as shown in the figure:

image-20221010093558473

2. Check the shell

image-20221010094036849

It can be seen that the program has a UPX shell.

3. Shelling

Classic UPX shelling

image-20221010161136168

4. Program analysis

OD intelligent search key string:
image-20221010162735586

Double-click Do not think u r good, the trace enters, and it is guessed that this is a prompt string after success.

It can be seen as follows:

image-20221010163025105

There is a strange string ULTRADMA, but I don’t know what it is used for. By tracing 00403C8C, you can find that this is a function similar to string comparison, and the password is:

image-20221010163726640

Instead of copying a hundred articles, it is better to practice and write one yourself. Respect intellectual property rights. Writing notes is hard work. Reprinting is prohibited! ! !

Guess you like

Origin blog.csdn.net/m0_64696290/article/details/131599420