2
<p><span class="h-card" translate="no"><a href="https://mastodon.social/@whitequark" class="u-url mention">@<span>whitequark</span></a></span> cosim testing ❤</p>
<p><span class="h-card" translate="no"><a href="https://mastodon.social/@dramforever" class="u-url mention">@<span>dramforever</span></a></span> and yes, you can make gdb execute a continue command when it hits a watchpoint</p>
<p>Today&#39;s <a href="https://fosstodon.org/tags/Wristcheck" class="mention hashtag" rel="tag">#<span>Wristcheck</span></a> is the <a href="https://fosstodon.org/tags/Casio" class="mention hashtag" rel="tag">#<span>Casio</span></a> AE-1200</p><p><a href="https://kevquirk.com/watches#casio-ae-1200" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">kevquirk.com/watches#casio-ae-</span><span class="invisible">1200</span></a></p>
Attached image 0
<p>you know you did something right when you can deliver shit within a day or two or just can say &quot;yeah I did see this coming and here it is ready. take it.&quot; </p><p>handful of quality tools and then you just write a little piece of new glue :)</p>
<p><span class="h-card" translate="no"><a href="https://mastodon.social/@whitequark" class="u-url mention">@<span>whitequark</span></a></span> i can&#39;t even read this right knowing the answer that&#39;s amazingly confusing</p>
<p>after that i considered brute-forcing it using a Kintex UltraScale FPGA that i had around (and i calculated that with the alphabet limited to 0-9 i could do it) but stopped because it felt unlikely that the intended solution to a &quot;medium&quot; crackme with &quot;Level 1&quot; in the title would involve $6000 worth of specialized hardware</p><p>this wouldn&#39;t have worked anyway because the function implements a bijection, and also because i misunderstood what the alphabet is and it wasn&#39;t 0-9</p>
<p>probably the single most &quot;i am about to give up&quot; moment was me concluding that i need to do a first preimage attack on a cryptographic function with nontrivial diffusion properties (flipping one bit anywhere changes basically the entire 16 byte output), i went to study and found out that basically no serious hash function has ever had a practical first preimage attack executed on it</p>
<p><span class="h-card" translate="no"><a href="https://hachyderm.io/@ed_blackburn" class="u-url mention">@<span>ed_blackburn</span></a></span> heh, you&#39;re welcome ^^</p>
<p>if you want a really good crackme try <a href="https://crackmes.one/crackme/67f9bdc38f555589f3530a85" target="_blank" rel="nofollow noopener" translate="no"><span class="invisible">https://</span><span class="ellipsis">crackmes.one/crackme/67f9bdc38</span><span class="invisible">f555589f3530a85</span></a></p>