Right after posting the first jz_crackme1 in my weblog, i added one more trick, and uploaded it in crackmes.de, as 'nobody' suggested.

http://www.crackmes.de/users/jz/jz_crackme1/

Among the solutions sent right to me through this blog, many others came through crackmes.de.

I thought why not introduce them here? so, I post solutions I got, and also the source itself .



If you would like to try out jz_crackme1, please don't take the fun part away from yourself by reading solutions first. Give yourself a shot, it's not difficult at all.

jz_crackme1




those who solved it and solutions sent right to my e-mail and this blog :

nobody :
seyool : blog springnote
iwillhackyou : blog
chpie : blog
StolenByte : blog


those from all over the world, maybe through crackmes.de :

skalk : pdf

柳州小林 : forum
刄閪闁閸闏乄 : forum(need to register)



and this is the source code of jz_crackme1. this is for you, 'izlesa' :)

the source code file contains two pairs of .h/.lib .

link them together, .lib file contains pe format parser and some utility functions

(GetSH means 'get section header', 'GetNH' means 'get nt header'
FindProcessName means what it means by its name, and rread2 means 'remote process read'.)










- Coreano -

블로그에 첫번째 크랙미를 올린 후, nobody님의 권유로 crackmes.de에 업로드를 했습니다.(한가지 트릭을 추가해서 ㅋㅋ)

그 곳으로도 몇개의 솔루션이 올라와서 블로그로 온 솔루션과 함께 소개해드립니다.

소스도 공개합니다.(누가 요청했길래..걍 공개)

두개의 헤더와 라이브러리가 함께 있습니다.

pe format 파서와 유틸코드정도인데요,

GetSH, GetNH 는 섹션헤더와 nt header를 얻는 함수이고,

FindProcessWithName은 알만하죠? rread2는 remote process read 입니다. 걍 더 함축된 편리한 함수들입니다.