downloadbrowseReWrit's ReWrit's Crackme#2

Download, 312 kb (password:
Browse contents of

ReWrit's Crackme#2

This is my second Crackme, i hope its a bit harden then
the first one. =P

patch it so the correct password will
be visible (check the picture in zip file)
and upload a solution.

Difficulty: 1 - Very easy, for newbies
Platform: Windows
Language: C/C++

Published: 01. Oct, 2008
Downloads: 1079


Votes: 5
Crackme is quite nice.

Rate this crackme:

Send a message to ReWrit »

View profile of ReWrit »


Solution by main, published 05. oct, 2008; download (298 kb), password: or browse.

main has rated this crackme as quite nice.

Solution by JoKa, published 03. oct, 2008; download (296 kb), password: or browse.

JoKa has rated this crackme as quite nice.

Submit your solution »

Discussion and comments

01. Oct 2008
It´s indeed very easy to find the password, but not _very_ easy to actually implement it. Btw: du är från sverige alltså?
02. Oct 2008
japp jag är från Sverige
02. Oct 2008
I´ve solved it now. A nice crackme. But I don´t think it´s a level 1, more like level 2 if you compare with other crackmes (spelar ju iofs ingen roll, men ändå).

Thanks anyway swedish friend! :)
02. Oct 2008
Testa förresten min VBCrackme om du vågar dig in på VBs outgrundliga vägar! :P
03. Oct 2008
[Only english here...]
03. Oct 2008
Oh, yes, sorry. Only english from now on!
03. Oct 2008
I solved this by importing printf with LordPE.
03. Dec 2008
Well, if someone need to patch something to see something then simply replacing jnz is quicker and give us same result.
24. Mar 2009
I could not understand JoKa's solution. ^^
0043F103 |. 8BCC MOV ECX,ESP
0043F105 |. 83C1 E0 ADD ECX,-20
0043F108 |. 894C24 0C MOV DWORD PTR SS:[ESP+C],ECX ; sets argument for call at 401A09

why "ADD ECX,-20" & "MOV DWORD PTR SS:[ESP+C],ECX" must be written, and

0043F189 |> 66:83F8 64 /CMP AX,64
0043F18D |. 7C 07 |JL SHORT cr7.0043F196
0043F18F |. 66:83E8 64 |SUB AX,64
0043F193 |. 43 |INC EBX
0043F194 |.^EB F3 \JMP SHORT cr7.0043F189
0043F196 |> 41 INC ECX
0043F197 |. 8819 MOV BYTE PTR DS:[ECX],BL
0043F199 |. B3 30 MOV BL,30
0043F19B |> 3C 0A /CMP AL,0A
0043F19D |. 7C 05 |JL SHORT cr7.0043F1A4
0043F19F |. 2C 0A |SUB AL,0A
0043F1A1 |. 43 |INC EBX
0043F1A2 |.^EB F7 \JMP SHORT cr7.0043F19B
0043F1A4 |> 41 INC ECX
0043F1A5 |. 8819 MOV BYTE PTR DS:[ECX],BL
0043F1A7 |. B3 30 MOV BL,30

why 'AX' is changed to 'AL' suddenly? ^^

and why "MOV BL,30" must be written?

Could anybody explain it to me kindly?

JoKa ~ Can you hear me? ^^

Kind Regards.
21. Jun 2009
@main: why did u use LordPE, printf was already imported?

kul crackme, bra jobbat!

You may leave your comment, thoughts and discuss this crackme with other reversers here.
Acting childish will not be tolerated.
HTML and such will be left as-is, so don't try.