ghsi10 on 11:56 AM 10/06/2020: i guess so, and it should be lvl 1
juansacco on 8:10 AM 10/13/2020: strcmp.. bouzu. this should be level 1 or -1
ker2x on 5:45 AM 10/20/2020: super easy if you use a debugger, not so much with static analysis. i got stuck for a moment with "mov word ptr [eax], 61h ; 'a'"
Fr0sty_93 on 11:09 AM 10/22/2020: For the moment I have very little knowledge of Assembly, but it was easy to get around it. Nevertheless, I have not been able to find the password Bouzu in clear text. Anyone have any solution to share ?
AzukiSnowy on 10:55 PM 10/22/2020: I've posted a solution for people that are still learning and don't quite understand this Crack-Me fully.
icehax on 10:51 PM 11/10/2020: easy using static analysis, i just posted a solution! :)
fetss on 9:59 AM 11/29/2020: I think I found the password in text
LEA EAX ,[ESP + 0x272d ]
MOV dword ptr [EAX ],0x7a756f62 // "zuob" but it is stored backwards
MOV word ptr [EAX + 0x4 ],0x75 // put the final "u" after the bouz