You must be logged in to post a comment
korsader on 2020-10-01 05:01: password 'bouzu'?
ghsi10 on 2020-10-06 11:56: i guess so, and it should be lvl 1
juansacco on 2020-10-13 08:10: strcmp.. bouzu. this should be level 1 or -1
ker2x on 2020-10-20 05:45: super easy if you use a debugger, not so much with static analysis. i got stuck for a moment with "mov word ptr [eax], 61h ; 'a'"
Fr0sty_93 on 2020-10-22 11:09: For the moment I have very little knowledge of Assembly, but it was easy to get around it. Nevertheless, I have not been able to find the password Bouzu in clear text. Anyone have any solution to share ?
AzukiSnowy on 2020-10-22 22:55: I've posted a solution for people that are still learning and don't quite understand this Crack-Me fully.
dannybest on 2020-10-23 08:31: easy peasy
GioTiN on 2020-11-09 19:55: password is : bouzu
=====================================
mozi2_00401445:
MOV DWORD PTR SS:[ESP],mozi2_00405044 ; ASCII "please password"
CALL puts ;
icehax on 2020-11-10 22:51: easy using static analysis, i just posted a solution! :)
fetss on 2020-11-29 09:59: I think I found the password in text
LEA EAX ,[ESP + 0x272d ]
MOV dword ptr [EAX ],0x7a756f62 // "zuob" but it is stored backwards
MOV word ptr [EAX + 0x4 ],0x75 // put the final "u" after the bouz
bycyberchild on 2021-05-21 16:15: ez
askuytr78 on 2022-03-23 07:04: tool: x64dbg
askuytr78 on 2022-03-23 07:04: ez
diozen87 on 2025-04-21 17:20: Password to uncompress? bouzu is not working
john_snow on 2025-08-14 08:28: if you new and ask for password to uncompress please read the faq to the site