During Black Hat USA 2012, ESET released a challenge, in which you need to build a key generator that passes 2 stages. Only one person managed to solve the crackme, and he did it in 10 hours. He later submitted another solution. Feel free to download the crackme and see if you can solve it yourself.
We are proud to present a new, growing collection from IBadishi Digital Art (the sharpest of you might note the family relationship ). The collection features hack-me shirts (try to hack them!), ASCII art, geek chic, and simply cool gear. You can see some samples below. We would also love to hear what you think and what cool designs you would like to see, so feel free to leave your comments below.
Last time, we talked about the solution to part 2 of GCHQ’s challenge. We now have an executable file named keygen.exe, and we need to figure out what to do with it. Of course, you can try to run it (just make sure you have Cygwin with the crypt library installed), but I prefer to disassemble it first, or run it in OllyDbg (or both).
Recall the image we need to decipher in GCHQ’s challenge:
So, we have an image with bytes written in hex all over it. The first thing that came to my mind is that these are opcodes for a program. Why did I think that? Well, I had several reasons:
- The first byte is 0xEB. This is the opcode for jmp. It might be a coincidence, but it was the first thing I noticed.
- The next thing I noticed was the character sequence “BBBB” (0×42424242), and two instances of “AAAA” (0×41414141), including one at the end.
- The bytes also contained the DWORD 0xDEADBEEF, in Intel’s little-endian format (i.e., reversed).
At the beginning of December 2011 (or maybe it all started on late November), UK’s Government Cyber Headquarters (GCHQ) published a challenge called “Can You Crack It?”. The site no longer contains the challenge, but rather hints on the solution. The webpage itself contained the following image, with an input line at the bottom, titled “Enter Keyword:”.
In the following posts I will detail the solution to GCHQ’s challenge, step by step. You can try it out for yourself, starting on this post. When you’re finished with step 1 (the image above) and know what should be the move to get to step 2, you can go to the next post.
See the solution to GCHQ’s challenge (step 1).