Password: kwenmafirsttest
Good crack! |
==> |
I changed JE in "00007FF7B744156E" to "JNZ" and compared cmp eax, ecx...
ECX contains the password characters...
At 00007FF7B744153C, the password comparison loop starts. |
==> |
Very easy |
==> |
Excellent Crackme! I broke down each function hand by hand until I found the exact checking part, and understood that to reach "Access Granted", the two blocks of memory compared in "memcmp" must be equal for EAX = 0 and the "test" instruction be valid , skipping the "jne" instruction |
==> |
Finally, be able to finish the challenge. Interesting challenge!! |
==> |
Managed to get the string "3Z___R3V3RU3", but something is still missing... Any light? |
==> |