[Reverse Engineering] Solving my first .net crackme

Syscall59
Syscall59
Dec 16, 2019 · 2 min read

This time we are tackling this .net crackme. Let’s try it out first.

It’s a simple form requesting a username and a serial key.

On the main form code, we can see the validation method being called inside the confirmation button click method.

On the form creation method values are being set for each Label component, which are the labels showing the product ID. The only textbox element is the username.

So, given any username, this is the correct serial.

092246username21

Let’s test this out

Great! we cracked the binary!


syscall59

Hacking/Infosec writeups and articles

Syscall59

Written by

Syscall59

Twitter: @syscall59 | medium.syscall59.com | syscall59@protonmail.com

syscall59

syscall59

Hacking/Infosec writeups and articles

Welcome to a place where words matter. On Medium, smart voices and original ideas take center stage - with no ads in sight. Watch
Follow all the topics you care about, and we’ll deliver the best stories for you to your homepage and inbox. Explore
Get unlimited access to the best stories on Medium — and support writers while you’re at it. Just $5/month. Upgrade