Uh oh. Looks like your using an ad blocker.
Our site is support by ads that help to pay our hosting costs. Please disable or whitelist us within your ad blocker to help us keep the site online.
All money generate by ads and donations is used to pay the hosting costs of the site.
View Thread
Author | App 14 | psyl0cke Member

Posts: 824 Location: sharing love everywhere ♥
Joined: 01.07.13 Rank: God | | I've read both articles, but I'm still stucked. I tried two things:
1. Searched for Good Job msg, above it I put breakpoint to CMP EAX,DWORD PTR SS:[EBP-8]. I entered random data, and in EAX there was 0******8. I converted it into decimal, it became 7******0. But it didn't work on the site nor at the application.
2. Searched for Good Job msg, above it there was a CMP, I edited JNZ SHORT 00401340 into JE SHORT 00401340. I cought Good Job! You got it The password is 7******0, but it doesn't work on the site too.
May somebody help me out? 
|
 |
Author | RE: App 14 | psyl0cke Member

Posts: 824 Location: sharing love everywhere ♥
Joined: 01.07.13 Rank: God | | I could solve it in OllyDbg, but I want to do it in Immunity Debugger too. If I set breakpoint to CMP EAX,DWORD PTR SS:[EBP-8], and I enter a random series, how will I be able to see that Stack [0240FF18]=00002674 in Immunity Debugger?
|
 |
Author | RE: App 14 | psyl0cke Member

Posts: 824 Location: sharing love everywhere ♥
Joined: 01.07.13 Rank: God | | I found the way: Right click -> follow in dump: Memory address: 74 26 00 00 = 2674h
|
 |
|