syscall59
Published in

syscall59

[Reverse Engineering] Solving my first .net crackme

This time we are tackling this .net crackme. Let’s try it out first.

It’s a simple form requesting a username and a serial key.

On the main form code, we can see the validation method being called inside the confirmation button click method.

On the form creation method values are being set for each Label component, which are the labels showing the product ID. The only textbox element is the username.

So, given any username, this is the correct serial.

092246username21

Let’s test this out

Great! we cracked the binary!

--

--

--

Hacking/Infosec writeups and articles

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Syscall59 — Alan Vivona

Syscall59 — Alan Vivona

Golang, Python, Javascript, Linux & Infosec. https://twitter.com/syscall59

More from Medium

Software Reverse Engineering: Diffusing Phase 2

Fuzzing Clojure Code With Jazzer

Clojure

4 Ways to Install Firefox 98.0 on Ubuntu / Linux Mint / AlmaLinux & Fedora

Install Firefox 98.0 on ubuntu

A software troubleshooting guide — Tips & Tricks