Donate to us!
The important thing is not to stop questioning. - Albert Einstein
Friday, December 14, 2018
Navigation
Home
 Find:
 Information:
Learn
Communicate
Submit
Shop
Challenges
 Exploit:
 Programming:
 Think:
 Track:
 Patch:
 Other:
 Need Help?
Other
Members Online
Total Online: 129
Guests Online: 127
Members Online: 2

Registered Members: 108597
Newest Member: apkluvdotcom
Latest Articles
View Thread

HellBound Hackers | Challenges | Application Cracking

Author

App 14

psyl0cke
Member



Posts: 824
Location: sharing love everywhere ♥
Joined: 01.07.13
Rank:
God
Posted on 07-08-16 11:49
I've read both articles, but I'm still stucked. I tried two things:
1. Searched for Good Job msg, above it I put breakpoint to CMP EAX,DWORD PTR SS:[EBP-8]. I entered random data, and in EAX there was 0******8. I converted it into decimal, it became 7******0. But it didn't work on the site nor at the application.

2. Searched for Good Job msg, above it there was a CMP, I edited JNZ SHORT 00401340 into JE SHORT 00401340. I cought Good Job! You got it The password is 7******0, but it doesn't work on the site too.

May somebody help me out? Smile


http://psyl0ckediary.tumblr.com/
Author

RE: App 14

psyl0cke
Member



Posts: 824
Location: sharing love everywhere ♥
Joined: 01.07.13
Rank:
God
Posted on 07-08-16 14:45
I could solve it in OllyDbg, but I want to do it in Immunity Debugger too. If I set breakpoint to CMP EAX,DWORD PTR SS:[EBP-8], and I enter a random series, how will I be able to see that Stack [0240FF18]=00002674 in Immunity Debugger?


http://psyl0ckediary.tumblr.com/
Author

RE: App 14

psyl0cke
Member



Posts: 824
Location: sharing love everywhere ♥
Joined: 01.07.13
Rank:
God
Posted on 12-08-16 20:57
I found the way: Right click -> follow in dump: Memory address: 74 26 00 00 = 2674h


http://psyl0ckediary.tumblr.com/