downloadbrowserezk2ll's Crackme_Nasm

Download CrackMe_ASM.zip, 915 b (password: crackmes.de)
Browse contents of CrackMe_ASM.zip

simple crackme coded in assembly ( NASM ) :p for newbies

Difficulty: 1 - Very easy, for newbies
Platform: Unix/linux etc.
Language: Assembler

Published: 21. Jan, 2015
Downloads: 532

Rating

No votes yet.
Rate this crackme:

Send a message to rezk2ll »

View profile of rezk2ll »

Solutions

Solution by Delirium, published 07. feb, 2015; download (854 b), password: crackmes.de or browse.

Delirium has not rated this crackme yet.

Solution by 1995parham, published 07. feb, 2015; download (425 b), password: crackmes.de or browse.

1995parham has not rated this crackme yet.

Solution by josamont, published 07. feb, 2015; download (500 b), password: crackmes.de or browse.

josamont has not rated this crackme yet.

Solution by draww, published 07. feb, 2015; download (10 kb), password: crackmes.de or browse.

draww has not rated this crackme yet.

Solution by downabc, published 07. feb, 2015; download (830 b), password: crackmes.de or browse.

downabc has not rated this crackme yet.

The submission of solutions is closed.

Discussion and comments

rathos
26. Jan 2015
BUG

mov ecx, ds:flag
mov ebx, ds:var
cmp ecx, ebx
jnz short failure

./CrackMe_ASM
Flag : S3Cr
you are correct !
易木马
01. Feb 2015
Flag:S3CrE+Fl4G!
but ,just begin with S3Cr,we can go right way!!
like this : S3Cr1111111111111111111111
S3Cr232313134335345fdgdgdgfdfsa
ok!
ecx ,ebx only saved 4 byes,
rezk2ll
Author
02. Feb 2015
my bad xD i will fix it
shahril
25. Feb 2015
try to use cmps for comparing strings

http://www.tutorialspoint.com/assembly_programming/assembly_cmps_instruction.htm
cd0c
11. Jun 2015
done in 2 minutes. very simple.
printf
13. Aug 2015
Nice one :) solved it with radare2
0x4a414154
06. Oct 2015
there was the bug and because of the bug, I didn't need the rest of the string, lol
bluehex
05. Jun, 03:34
Essentially, it asks for input and writes it to memory.
Next, it loads the flag one char (8 bytes) at a time into memory.
Lastly, it compares your input with the flag in memory. If they're equal the jump is not taken and you solve it.
bluehex
05. Jun, 03:35
*8 bits at time. Cant edit my comment, oops

You may leave your comment, thoughts and discuss this crackme with other reversers here.
Acting childish will not be tolerated.
HTML and such will be left as-is, so don't try.