Would really appreciate if someone is able to give a little hint on root @[email protected] i have a hunch on what to do to exploit s**, but after trying multiple attacks/existing vulnerabilities on the t** file type, it didnt pay off, am i missing something?
Ok. Solved. Thanks to @bjornmorten. Hints
Waltz Dance Steps
2. "Brute Force"
3. "A very simple form of encryption"
All three are basic 'encryption' schemes, do not go into complex encryption which require IV's. Use …
g*** server down?
Edit: Enum the network and Directories!
Edit2: Omaigod, rooted after 2 weeks! Would be months if it weren't for the immense help given by @Alienware @TSB @cyberus
To newcomers: Get on the box, you'll learn PLENTY!
Hint for user:…
....need help on root....stuck for weeks
Missing the ci******** for the d****** function
Edit: For root, I strongly suggest downloading the application locally, creating your own database and put some print functions around the crypto functions
No guessing is required.
1. For unpacking, follow @opt1kz comment.
2. Find out the conditions of getting the congratulation message.
For newbies (Like Me): IDA - graph view is very helpful. Makes Reverse Engineering easier.