CrackMe® Practices for Newbies
PROJECT 6: caveman by Ghiribizzo

Next Tasks.
Monday, 22-Feb-99 15:44:29

    Some good work done to date, keep it up everyone, and EB:get working!

    I think most people have identified the keyfile in use, but no-one has yet recognised the real problem here. Perhaps you have rushed into a keyfile...decrypt...type of scenario. Well, the problem is really not as difficult as all that, and in fact there is a lot to be said for seeing the problem here, so: next tasks:

    Most people seem to have noticed the way the table at 1b1 is used, hinted at by noos and andy first. The routine is simply a short little decompression routine......

    1. The table at 1b1 is decompressed, so concentrate on the decompressed form of this table, and tell me how it is accessed and when it is changed. How would the keyfile affect this table ? How is the table accessed ? Does the way in which the table is accessed give you any clues as to what the new table *really* is ? If you don't notice any more then answer this: In how many different ways is the table accessed, and what do they have in common ?

    2. Once question one is understood, and the answers to it are clear, tell me what Ghiris problem *really* is. What are the rules ? What is the keyfile, and which of Ghiris comments, which may not have previously meant very much to you has suddenly become much clearer ?

    Cronos.

    ps Let me know if I'm asking questions too fast!


    Cronos

Back to main board