This blog post was authored by Hasherezade

Update:

过去两次2017,2018)我们发布了专门针对有抱负的恶意软件分析师的捕获范围挑战。每次它是一个可执行的窗口,最多包含3个阶段以打破,以获取最终标志。Crackme的目的是提供一项练习,其中参赛者将能够在现实生活中通常存在的理解和克服技术方面挑战自己。然而,我们以无害的例子呈现它们。

After a long break, we decided to resume our small contest, and possibly make it an annual event. Without further ado, we present you the Malwarebytes CrackMe number 3!

Rules of the contest

The rules remain mostly unchanged sincethe second edition。As before, we have two parallel tracks of the contest:

  1. The fastest solve.最早提交的旗帜获胜。该标志应与(最小)有关找到它所采取的步骤的注释。(不需要详细的写入。)有关此类别中已知获奖者的任何更新将附加到本文中。
  2. The best write-up。文章将以其教育价值,清晰度和准确性来判断。作者应展示他们解决裂纹的方法,并提供对挑战中使用的技术的解释。挑战开始两周后,文章提交的内容结束了。

In each track we will select three winners that will be rewarded with unique Malwarebytes swag. The first place winner in each category will additionally get any IT-related book of their choice. All the solvers are going to be listed in our hall of fame.

标志的格式是:flag{...}

Submissions to both contests should be sent as a private message to the Twitter account:@hasherezade

挑战开始三周后,我们将发布闭幕摘要以及作者提供的详细演练。

WARNING: We are sorry, but Malwarebytes employees and people who have access to the CrackMe before the official publication are not allowed to participate.

The application

The application is a Windows executable. It was tested on Windows 8 and above.

WARNING:请记住,由于CrackMe包含与恶意软件中使用的技术相似的技术,因此可以通过各种AV产品标记它。这是一个已知的假阳性。我们建议您将其运行在VM上,而Windows Defender已禁用。

您可以下载这里

Best of luck, and have fun!

Hall of fame

We already have the winners in the category “the fastest solve”:

  1. @nazywam
  2. Suvaditya Sur (@x0r19x91)
  3. @evandrix
  4. Alex Skalozub (@pieceofsummer)
  5. @jleow00
  6. rainbowpigeon
  7. arm4nd0
  8. Matthieu Walter(@matth_walter)

But you can still be included in this “Hall of fame”, just send us your solution!