People finally cracked the password for Jan-2019 leak of IDA72 "crackme" installer,
by reproducing the password generation script from known passwords (turned out to be a rand-based perl script).
https://devco.re/blog/2019/06/21/ope...nusual-way-en/
https://www.reddit.com/r/ReverseEngi...nstaller_prng/
password is 7JpT48a7Y2fv
this is the script:
Code:
#!/usr/bin/env perl
#
@_e = split //,"abcdefghijkmpqrstuvwxyzABCDEFGHJKLMPQRSTUVWXYZ23456789";
$i=948301080;
srand($i);
rand 54; # собственно пропускаем 1 вызов rand...
$pw="";
for($i=0;$i<12;++$i)
{
$key = rand 54;
$pw = $pw . $_e[$key];
}
print "$pw\n";