Several months ago we at zImperium started toying with the idea of ARM crackmes – we felt the ARM RE community was left a little behind, with no real interesting challanges laying ahead.
We sat down to do our thing, and about a month ago we released zCrackme#1 – our very own ARM crackme which initiated the 1st zCrackme competition for the advanced reversers community. The response was overwhelming – many people submitted their results, describing their methods and – most important – demanding more.
And so we did. We listened to you guys, we implemented counter defense, and we are now presenting PUBLICLY – zCrackme#2, aka “No more Mr. nice guy”.
This zCrackme holds more than beats the eye – we really stepped up and raised the bar on this one. Some new tricks, some old ones, all to make this zCrackme more challenging We won’t tell you what exactly, but let you find out yourself (it’s more fun this way, ain’t it?
So, go a head, what are you waiting for? Try your luck (or show your skills, depends how you look at it) with our zCrackme#2, and win fame, beer & glory!
Rules of the game – find the correct password to win a free beer. All methods are valid – patch the binary, wrap it, crack it, smash it ,disassemble it – all is good (if you are lucky, that is…). If you find the correct password, you will know what todo to get your beer. No cheating allowed – only unique & complete submissions will be approved.
To announce your victory, submit the solution via twitter with “Found #zCrackme2 password: MD5(PASSWORD) /CC: @zimperium”
# unzip zcrackme.zip
# adb push zcrackme /data/local/tmp
# adb shell
$ cd /data/local/tmp
$ chmod 777 zcrackme
You will need it
Here is what you get when zCrackme detects an arse: