Upload: 9:20 AM 09/13/2020
This is easy!You can do it!!
korsader on 5:01 AM 10/01/2020: password 'bouzu'?
ghsi10 on 11:56 AM 10/06/2020: i guess so, and it should be lvl 1
juansacco on 8:10 AM 10/13/2020: strcmp.. bouzu. this should be level 1 or -1
ker2x on 5:45 AM 10/20/2020: super easy if you use a debugger, not so much with static analysis. i got stuck for a moment with "mov word ptr [eax], 61h ; 'a'"
Fr0sty_93 on 11:09 AM 10/22/2020: For the moment I have very little knowledge of Assembly, but it was easy to get around it. Nevertheless, I have not been able to find the password Bouzu in clear text. Anyone have any solution to share ?
AzukiSnowy on 10:55 PM 10/22/2020: I've posted a solution for people that are still learning and don't quite understand this Crack-Me fully.
dannybest on 8:31 AM 10/23/2020: easy peasy
GioTiN on 7:55 PM 11/09/2020: password is : bouzu
MOV DWORD PTR SS:[ESP],mozi2_00405044 ; ASCII "please password"
CALL puts ;
icehax on 10:51 PM 11/10/2020: easy using static analysis, i just posted a solution! :)
fetss on 9:59 AM 11/29/2020: I think I found the password in text
LEA EAX ,[ESP + 0x272d ]
MOV dword ptr [EAX ],0x7a756f62 // "zuob" but it is stored backwards
MOV word ptr [EAX + 0x4 ],0x75 // put the final "u" after the bouz
You must me logged to submit a solution
Solution by AzukiSnowy:Solution and Walk-through for everybody that still doesn't understand this simple crack-me.
Share how awesome the crack me was or where you struggle to finish it ! (Stay polite)