We fire up crackme02 file and put some text.
Fire up Olly and open the crackme02 file. Starting at memory address "0040123F", analyzing the result of TEST Cl,CL. If the result is equal, the flow will jump to "0040124A"
Memory address 0040124A will call memory address "00401334" which is the right path going to "Good Work" dialog box.
If the Test Cl,CL result is not equal, then the next execution will be at memory address "00401243" where the call to "00401349" was made.
What we will do is to reverse the jmp operation at memory address "00401241" from "JE" to "JNE". So whatever password we try, the program will accept it.
Now, fire up Heiw and select decode.
Go to memory address "00401241". Change the "74" to "75". Press F9 to update and F10 to quit.