IOLI 0x00

    The first thing to check is if the password is just plaintext inside the file. In this case, we don’t need to do any disassembly, and we can just use rabin2 with the -z flag to search for strings in the binary.

    1. [Strings]
    2. nth paddr vaddr len size section type string
    3. -------------------------------------------------------
    4. 2 0x0000058f 0x0804858f 6 7 .rodata ascii 250382
    5. 3 0x00000596 0x08048596 18 19 .rodata ascii Invalid Password!\n
    6. 4 0x000005a9 0x080485a9 15 16 .rodata ascii Password OK :)\n

    So we know what the following section is, this section is the header shown when the application is run.

      This is the error on entering an invalid password.

      This is the message on the password being accepted.

      Let’s give this a shot.

      1. $ ./crackme0x00
      2. IOLI Crackme Level 0x00
      3. Password: 250382

      So we now know that 250382 is the password, and have completed this crackme.