Xspider's xCryptokGnMe #1

[difficulty: 2][protection: modified blowfish, distractions]

This crackme does a few things to distract you, like getting the dialog text of fields that don't exist, computing a SHA1 hash and then not using it, and other calculations. Ultimately 16 calls to blowfish's F() function (that does not use the tables within the blowfish context struct) work on the first 64-bits of your entered username. A little custom math after that computers your 64-bit key. Crackme is fishable.

No comments:

Post a Comment

thanks for commenting!