So this is very very hard,i've got source code on ghidra,maybe this can help.
https://pastebin.com/raw/xC0smupv |
==> |
its
admin
C0pl3x |
==> |
I've unlocked the password using ghidra,this is kinda of the source code where the username and password is at
void FUN_140001290(void)
{
undefined auVar1 [16];
undefined auVar2 [16];
undefined *puVar3;
ulonglong uVar4;
undefined *puVar5;
ulonglong uVar6;
int iVar7;
undefined *puVar8;
longlong *plVar9;
char *pcVar10;
undefined auStack_78 [32];
undefined local_58 [16];
longlong local_48;
ulonglong local_40;
undefined local_38 [16];
longlong local_28;
ulonglong local_20;
ulonglong local_18;
local_18 = DAT_140005010 ^ (ulonglong)auStack_78;
local_48 = 0;
local_40 = 0xf;
local_58._1_15_ = SUB1615(ZEXT816(0),1);
auVar1[15] = 0;
auVar1._0_15_ = local_58._1_15_;
local_58 = auVar1 |
==> |
Amazing,first time i've unlocked the password,so its located in "811D7" And it has a string called (B) So if its detected on source it will open. |
==> |