Root-Me Reversing: crackme_wtf hints

It’s been some time since I’ve done some Reverse Engineering and today I’ve completed a simple challenge on The filename of the challenge is crackme_wtf and here are some hints to get you started:

  1. Determine type of FILEs.
  2. Don’t be afraid to patch and use a debugger.
  3. Try to eliminate the randomness. Maybe some functions that have to do with time, random numbers or the current process’s id.
  4. If the last hint doesn’t yield any results… Is the required password really needed to get to the flag?

Thanks for reading and good luck!

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.