This is a reverse engineering challenge was developed for Windows.
If you enjoy low level reverse engineering and cryptography challenges you should have a good time.
The IT team of a secret organization was tasked to create a hashing function. The next day the algorithm was implemented in all the authentication systems of the secret organization.
You have been tasked by a competing organization to find vulnerabilities within the authentication system of a software.
This program accepts a password of 16 characters. The goal is to find a valid password to get the message "Access granted.".
A cryptographically weak hash function was used for this challenge, there are many passwords to authenticate.