
#1
Posted 26 January 2014 - 01:27 AM
As of now it just loads test.exe from its .rdata section into the .bss and runs it, overlaying headers, just a simple hello world message box.
Password to archive is the name of this obfuscated std c function:
- Jochen, x58, Cypher and 3 others like this
The surest way to corrupt a youth is to instruct him to hold in higher esteem those who think alike than those who think differently.
#2
Posted 26 January 2014 - 03:27 AM
You could do it harder next time , so , man has to compile project and then sees the password !
- kuupa likes this
#3
Posted 27 January 2014 - 04:03 AM
Hess, on 26 Jan 2014 - 02:27 AM, said:
Lol I think this is plenty hard. Has anyone managed to find the password?You could do it harder next time , so , man has to compile project and then sees the password !
![]()
- Hess likes this
The surest way to corrupt a youth is to instruct him to hold in higher esteem those who think alike than those who think differently.
#4
Posted 28 January 2014 - 09:01 PM
Is this obfuscated code of MessageBox api ?
Btw i like your obfuscator... Any ideas to sell it?
- Hess likes this
#5
Posted 29 January 2014 - 07:39 AM
d3m, on 28 Jan 2014 - 8:01 PM, said:
Naw, it's my own implementation of a standard c library function, so not MessageBox (WinAPI). Not a code obfuscator, just handwritten.Is this obfuscated code of MessageBox api ?
[...]
Btw i like your obfuscator... Any ideas to sell it?
Standard c library is fairly small, if you cannot solve this it is not for you.
- Hess likes this
The surest way to corrupt a youth is to instruct him to hold in higher esteem those who think alike than those who think differently.
#6
Posted 29 January 2014 - 09:43 AM
Removed unrelated posts.
Also, if you are not able to find the password to the archive on your own: this is not for you.
- x58, Hess and Rottweiler like this
#7
Posted 29 January 2014 - 11:24 AM
Like i am running your code and see that this is a function with one parameter. This parameter has 0x3FF possibilities. What i understand that you generate the position to the C lib code. But i don't have any input value. And i don't want to bruteforce,.. like it looks like you give me not enough data.
Second post:
What i understand that this function with input_X generete Output_Y.
And the same input_X with a unknown C lib function generate output_Y.
Like what i know is that input has 1024 possibilities and the function has 1 argument.
- Hess likes this
#8
Posted 30 January 2014 - 03:00 PM
I even bruteforced the input Value and didnt't get any closer than you. eax is always zero for all possibilities?
Sure the function works? I'm guessing on something like islower, isdigit, isalnum.
This is plenty hard!
Unfortunately I'm an ASM beginner and havent enough time for a completely Analysis.
But its a nice riddle.
- Hess likes this
#9
Posted 31 January 2014 - 01:41 AM
IamLupo, on 29 Jan 2014 - 10:24 AM, said:
It is the name of a function. Try representing it in a higher level language, that will help you figure out what it is actually doing.Like i am running your code and see that this is a function with one parameter. This parameter has 0x3FF possibilities. What i understand that you generate the position to the C lib code. But i don't have any input value. And i don't want to bruteforce,.. like it looks like you give me not enough data.
Second post:
What i understand that this function with input_X generete Output_Y.
And the same input_X with a unknown C lib function generate output_Y.
Like what i know is that input has 1024 possibilities and the function has 1 argument.
Since I have been asked for hint by multiple people, I will give one. Please do not pm me asking for help. This is NOT the disassembly of a function, it's a handwritten obfuscation that produces the same output as a c standard library function.
Hint: why are the shl and shr instructions are at the beginning of the function.
- Hess likes this
The surest way to corrupt a youth is to instruct him to hold in higher esteem those who think alike than those who think differently.
#10
Posted 31 January 2014 - 06:59 AM
Now kuupa , next step , before this gets solved , obuscate this already obfuscated code and double password length !!!!
DOn't let this get solved for at least 6 months !!!!
- kuupa likes this
#11
Posted 31 January 2014 - 09:54 AM
- xor edx, edx ;edx=0
- mov eax, [esp+4] ;eax=arg0
- shl eax, $16
- shr eax, $16 ;zero everything except the first 10 bit? you unsettle me with you hint
- test al, $40 ;7th bit set? but why this test?
- and ecx, edx ;because edx=0 ecx always will be zero and the zero flag always will be set
- cmovnz edx, eax ;so this is irrelevant?
I will give this a try later. Thats not my level.
- x58 and Hess like this
#12
Posted 31 January 2014 - 11:37 AM
Do not post the password if you found it!
If kuupa wanted every idiot to download/leech this, he would've posted the password in plaintext himself.
Please think before you post!
// corresponding post removed
- x58, Hess and kuupa like this
#13
Posted 01 February 2014 - 12:47 AM
Tigerass, on 31 Jan 2014 - 08:54 AM, said:
My apologies, the test al, $40 and and ecx, edx lines should be reversed. Flags should correspond to test. This is what I get for not debugging all possible solutions and not keeping a consistent base in all the constants.I will give this a try later. Thats not my level.
- xor edx, edx ;edx=0
- mov eax, [esp+4] ;eax=arg0
- shl eax, $16
- shr eax, $16 ;zero everything except the first 10 bit? you unsettle me with you hint
- test al, $40 ;7th bit set? but why this test?
- and ecx, edx ;because edx=0 ecx always will be zero and the zero flag always will be set
- cmovnz edx, eax ;so this is irrelevant?
- Hess and Tigerass like this
The surest way to corrupt a youth is to instruct him to hold in higher esteem those who think alike than those who think differently.
#14
Posted 01 February 2014 - 01:51 AM
kuupa , mission accomplished , I told You to do it harder !
- kuupa likes this
#15
Posted 01 September 2014 - 08:20 PM
Download link is dead. Does anyone still have the file ? I wanted to ask Kuupa if he could reupload but (Last Active Apr 27 2014 11:04 PM.)
- x58 likes this
Also tagged with one or more of these keywords: source
![]() |
Programming →
Basic →
Resources →
![]() [PUREBASIC] Windows VersionStarted by blowfish , 25 Mar 2016 ![]() |
|
|
source
Programming →
.NET (CIL/MSIL) →
Resources →
Java Cloud Compiler - Compile Java/JARs in your .NET appStarted by Rottweiler , 07 Dec 2015 ![]() |
|
|
|
Malware Analysis & RCE. →
Malware Samples →
Katrina Panel + Builder by pos.maisterStarted by pos.maister , 23 Nov 2015 ![]() |
|
|
|
source
Programming →
.NET (CIL/MSIL) →
Resources →
![]() pdnpwn - Paint.NET Plugin InfectorStarted by Rottweiler , 25 Oct 2015 ![]() |
|
|
|
Programming →
.NET (CIL/MSIL) →
General Discussion →
VB.NET/Scantime(?) Undetection POCStarted by Rottweiler , 04 Oct 2015 ![]() |
|
![]()
|