Share how awesome the crack me was or where you struggle to finish it! Stay polite and do not spoil the solution/flag!
9:20 AM 09/13/2020
This is easy!You can do it!!
korsader on 5:01 AM 10/01/2020: password 'bouzu'?
ghsi10 on 11:56 AM 10/06/2020: i guess so, and it should be lvl 1
juansacco on 8:10 AM 10/13/2020: strcmp.. bouzu. this should be level 1 or -1
ker2x on 5:45 AM 10/20/2020: super easy if you use a debugger, not so much with static analysis. i got stuck for a moment with "mov word ptr [eax], 61h ; 'a'"
Fr0sty_93 on 11:09 AM 10/22/2020: For the moment I have very little knowledge of Assembly, but it was easy to get around it. Nevertheless, I have not been able to find the password Bouzu in clear text. Anyone have any solution to share ?
AzukiSnowy on 10:55 PM 10/22/2020: I've posted a solution for people that are still learning and don't quite understand this Crack-Me fully.
dannybest on 8:31 AM 10/23/2020: easy peasy
GioTiN on 7:55 PM 11/09/2020: password is : bouzu ===================================== mozi2_00401445: MOV DWORD PTR SS:[ESP],mozi2_00405044 ; ASCII "please password" CALL puts ;
icehax on 10:51 PM 11/10/2020: easy using static analysis, i just posted a solution! :)
fetss on 9:59 AM 11/29/2020: I think I found the password in text LEA EAX ,[ESP + 0x272d ] MOV dword ptr [EAX ],0x7a756f62 // "zuob" but it is stored backwards MOV word ptr [EAX + 0x4 ],0x75 // put the final "u" after the bouz
bycyberchild on 4:15 PM 05/21/2021: ez
askuytr78 on 7:04 AM 03/23/2022: tool: x64dbg
askuytr78 on 7:04 AM 03/23/2022: ez