My Project Solutions to reversing.kr crackmes
Easy_CrackMe.exe
- Binary, originalEasy_CrackMe.exe.idb
- Binary IDA Database, fully reversed
Easy_UnpackMe.exe
- Binary, originalEasy_UnpackMe.exe.idb
- Binary IDA Database, everything important reversedReadMe.txt
- Instructions
It was not, at all, necessary to reverse the binary to find the OEP, but i did it anyways because i wanted to see how the unpacker works. It basically decrypts everything, then executes it afterwards. Execution ends with the packed executable exiting. I just left super obvious multiples of instructions unreversed. Everything else is fully explained.