Reverse Engineering challenge #45.

Tags: X86 MIPS LINUX EXEC L2 WINDOWS .

This is a software copy protection imitation, which uses a key file. The key file contain a user (or customer) name and a serial number.

There are two tasks:

The files:

More challenges: challenges.re; about solutions: challenges.re/#Solutions.