{"id":12146,"date":"2018-04-27T08:10:04","date_gmt":"2018-04-27T16:10:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/04\/27\/news-5915\/"},"modified":"2018-04-27T08:10:04","modified_gmt":"2018-04-27T16:10:04","slug":"news-5915","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/04\/27\/news-5915\/","title":{"rendered":"Malwarebytes CrackMe 2: try another challenge"},"content":{"rendered":"<p><strong>Credit to Author: hasherezade| Date: Fri, 27 Apr 2018 15:00:00 +0000<\/strong><\/p>\n<p>Last November, we released the first edition of the\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2017\/11\/how-to-solve-the-malwarebytes-crackme-a-step-by-step-tutorial\/\" target=\"_blank\" rel=\"noopener\">Malwarebytes CrackMe<\/a>. Encouraged by the positive response we received from the security community, we decided to repeat the game, hopefully making it even more interesting and entertaining.<\/p>\n<p>As before, the CrackMe is dedicated to malware analysts and to those who want to practice becoming them. That&#8217;s why it is not just a set of some abstract riddles, but an exercise that walks through selected tricks that were used in real malware. (Expect some original schemes designed just for this game, too.)<\/p>\n<p>Of course, all is demonstrated on harmless examples, but we still recommend you use VM for reversing it so that it will not interfere with any antivirus protection.<\/p>\n<h3>Rules of the contest<\/h3>\n<p>There are two CrackMe contests:<\/p>\n<ol>\n<li><strong>Capture the flag.<\/strong>\u00a0The first three submitted flags win. The flag should be submitted along with (minimalistic) notes about the steps taken to find it. (No detailed write-up is required.)<\/li>\n<li><strong>Best write-up<\/strong>. The write-up will be judged by its educational value, clarity, and accuracy. The author should show his\/her method of solving the CrackMe, as well as their level of understanding of the techniques used. The write-up submission contest closes three weeks after capture the flag.<\/li>\n<\/ol>\n<p>Submissions to both contests should be sent to my Twitter account: <a href=\"https:\/\/twitter.com\/hasherezade\" target=\"_blank\" rel=\"noopener\">@hasherezade<\/a>. Each of the four winners will get a prize: a book of his\/her choice and some Malwarebytes swag.<\/p>\n<p>At the end of the contest, I will publish my own solution, made from the point of view of author. All the submitted write-ups will be linked.<\/p>\n<h3>Asking questions<\/h3>\n<p>I want the contest to be fair to everyone, so I will not be answering any questions in private. However, if you are stuck, please don&#8217;t hesitate to post your question in the comments section of this post, and I will answer as soon as possible. The questions can be also answered by other participants. Giving false clues or teasing beginners will result in a ban\u2014please respect fair play.<\/p>\n<h3>The application<\/h3>\n<p>The application is a Windows executable. It was tested on Windows 7 and above.<\/p>\n<p>You can download it <a href=\"https:\/\/goo.gl\/7zX66h\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23430\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/04\/malwarebytes-crackme-2-another-challenge\/attachment\/crackme_level1\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/crackme_level1.png\" data-orig-size=\"672,624\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"crackme_level1\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/crackme_level1-300x279.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/crackme_level1-600x557.png\" class=\"alignnone size-full wp-image-23430\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/crackme_level1.png\" alt=\"\" width=\"672\" height=\"624\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/crackme_level1.png 672w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/crackme_level1-300x279.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/crackme_level1-600x557.png 600w\" sizes=\"auto, (max-width: 672px) 100vw, 672px\" \/><\/p>\n<p>Have fun!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/04\/malwarebytes-crackme-2-another-challenge\/\">Malwarebytes CrackMe 2: try another challenge<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/04\/malwarebytes-crackme-2-another-challenge\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: hasherezade| Date: Fri, 27 Apr 2018 15:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/2018\/04\/malwarebytes-crackme-2-another-challenge\/' title='Malwarebytes CrackMe 2: try another challenge'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/crackme_banner.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Last November, we launched the first Malwarebytes CrackMe. Encouraged by an overwhelmingly positive response, we decided to repeat the game\u2014this time making it even harder and more fun.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/technology\/\" rel=\"category tag\">Technology<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/crackme\/\" rel=\"tag\">crackme<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/crackme-contest\/\" rel=\"tag\">CrackMe contest<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malwarebytes-crackme\/\" rel=\"tag\">Malwarebytes CrackMe<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/2018\/04\/malwarebytes-crackme-2-another-challenge\/' title='Malwarebytes CrackMe 2: try another challenge'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/04\/malwarebytes-crackme-2-another-challenge\/\">Malwarebytes CrackMe 2: try another challenge<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[16539,18259,16541,10497,1331],"class_list":["post-12146","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-crackme","tag-crackme-contest","tag-malwarebytes-crackme","tag-security-world","tag-technology"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12146","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12146"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12146\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12146"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12146"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12146"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}