https://github.com/Maijin/radare2-workshop-2015/tree/master/IOLI-crackme/bin-linux
Check the file.
Test the program out.
Analyze the program in GDB.
crackme0x03x is very similar to crackme0x02x but has a test function built instead of compare.
There are two ways to find the password.
- The lines inside the orange box can be equated to give us an answer.
- Set a breakpoint at the test function and print out the variable for [ebp-0xc]
Disassemble the test function
Run a breakpoint to find out the value of the strings.
Looks like its encrypted strings and just an obfuscation for the challenge.
Test the password