My_dog

My Dog5 by n0ve3mber


Date: 14.03.2021


Analyze flags, function calls etc using: radare2 -A -d "My Dog5.exe"
1.png

Now let's check what we can find inside the main function: pdf @main
2.png

There is a function called named sym str2md5(char const*, int), looks like this takes an input string and hashes it with MD5.

Also there's a hardcoded string fitting into the MD5 format.

Let's take this string and try to dehash it, for dehashing we could either try an online service or fire up hashcat.

In this case I will first try my luck with https://crackstation.net before firing up hashcat. 3.png

As assumed it's indeed a MD5 Hash and I even got a result: admin1234.

Let's start the application and test if this is actually his dog's name:

4.png

Success! We found his dog's name whether that's a good name or not is up to you...


Tags:

radare2, crackmes.one, reversing, crackme, reverse engineering, PE32