View Full Version : crypt crackme:blowfish
lordor
February 20th, 2004, 03:25
Hi,I come back again,this time bring the crypt crackme No3 here,if succeed,you will see a website! Gook Lock!
any quetion,pleas mail to :lordor@digitalnuke.com
by lordor
04.2.20
ZaiRoN
February 22nd, 2004, 08:38
Hi lordor,
nice one! A simple blowfish crackme for those whom have never seen this algo before.
Well, all the things that you need to know in order to solve this crackme are the functions used by the blowfish's implementation: the initialization function followed by an encryption/decryption function. Use google to locate (one of the millions) blowfish implementation and then try to understand what the crackme want... ;-)
Zai
lordor
February 23rd, 2004, 05:56
hi,zai
This crackme is very simple.I make this crackme just want to let the beginer to learn blowfish algorithm.
the lenght of serial is 20,the first 4 byte is "4002".
klier
April 3rd, 2004, 10:12
made a keygen for the blowfish crackme.
works on my computer,not sure on all.
can someone test?
Regards,
GabryJ
April 3rd, 2004, 10:27
no, it gives me an error and shutdowns.
Application called (some bytes) from (some bytes) Memory cannot be "read". Click ok to quit or cancel to debug. with a critical message box.
klier
April 3rd, 2004, 10:31
shiiit
thank you,
ZaiRoN
April 3rd, 2004, 11:29
Well done klier, it works on my xp sp1 machine.
GabryJ, which os are you using?
Zai
klier
April 6th, 2004, 14:20
just curious.
on wich os it's crashing?
i have winxp sp1 to.
anybody
Regards,
GabryJ
April 7th, 2004, 08:26
I have Win2k
It runs, but when I hit Generate or so...it crashes

klier
April 7th, 2004, 11:09
probably smashed the stack
sorry
i learn best with trial and error and error and error....
Regards,
lordor
April 9th, 2004, 22:27
to klier:
your kegen will crash on my win2000sp4.but when using ollDbg to debug the kegen,It can create the right key in memory,gread!
roticv
April 12th, 2004, 10:36
No, you did not preserve ebx, breaking the number one rule in win32asm coding.
klier
April 12th, 2004, 11:58
Then i'm sorry that i broke the number one rule in win32asm coding.
Better next time.
Was my first keygen(no excuse).
Regards,
dev_zero
April 17th, 2004, 16:53
I'm gonna try it in wine linux..

Just wondering does anyone know about som good crypt revers engineering tutorials...? I don't know exactely what to do here?
http://wwww.digitalnuke was displayed first
"Nuke Group" was displayed second
nikolatesla20
May 4th, 2004, 13:46
Quote:
[Originally Posted by roticv]No, you did not preserve ebx, breaking the number one rule in win32asm coding. |
That's why for quick and dirty ASM programs I just use pushad/popad on all my functions.
-nt20
klier
May 4th, 2004, 14:01
Quote:
[Originally Posted by nikolatesla20]That's why for quick and dirty ASM programs I just use pushad/popad on all my functions. |
Yep,never forget.

Powered by vBulletin® Version 4.2.2 Copyright © 2018 vBulletin Solutions, Inc. All rights reserved.