korsader on 2020-10-01 05:01:
[Click to reveal]password 'bouzu'?
ghsi10 on 2020-10-06 11:56:
i guess so, and it should be lvl 1
juansacco on 2020-10-13 08:10:
strcmp.. bouzu. this should be level 1 or -1
ker2x on 2020-10-20 05:45:
super easy if you use a debugger, not so much with static analysis. i got stuck for a moment with "mov word ptr [eax], 61h ; 'a'"
Fr0sty_93 on 2020-10-22 11:09:
For the moment I have very little knowledge of Assembly, but it was easy to get around it. Nevertheless, I have not been able to find the password Bouzu in clear text. Anyone have any solution to share ?
AzukiSnowy on 2020-10-22 22:55:
I've posted a solution for people that are still learning and don't quite understand this Crack-Me fully.
GioTiN on 2020-11-09 19:55:
[Click to reveal]password is : bouzu
=====================================
mozi2_00401445:
MOV DWORD PTR SS:[ESP],mozi2_00405044 ; ASCII "please password"
CALL puts ;
icehax on 2020-11-10 22:51:
easy using static analysis, i just posted a solution! :)
fetss on 2020-11-29 09:59:
[Click to reveal]I think I found the password in text
LEA EAX ,[ESP + 0x272d ]
MOV dword ptr [EAX ],0x7a756f62 // "zuob" but it is stored backwards
MOV word ptr [EAX + 0x4 ],0x75 // put the final "u" after the bouz