KeygenMeByLy
本帖最后由 Y4Ng 于 2013-6-6 23:48 编辑win32汇编写的.
学习win32的窗口和DialogBox
P个图看看
bp exitprocess asd9988 发表于 2013-6-12 08:26 static/image/common/back.gif
bp exitprocess
bp DestroyWindow
bp GetDlgItemTextA
本帖最后由 zcc1414 于 2013-8-6 17:31 编辑
小菜不知道这种类型怎么逆向求大牛教
为啥KEYGENME整成了 crackme了········
我只是逆向你的算法但是不知道逆向出 KEYGENME
eax = ecx*0xC0D + 0x7
int jiamalen = 0x11,zhanghaolen = 0xc;
int sum1,sum2,sum3,sum4;
char str[] = "123456789012";
char str2[] = "12345678901234567";
char *p = str;
char *p2 = str2;
__asm
{
mov eax,0x2
add eax,0x6 ;11
add eax,jiamalen
shl eax,0x6 ;19
lea esi,dword ptr ds: ;640
imul eax,esi,0x512 ;6C8
mov sum1,eax
}
__asm
{
mov edx,sum1
mov ecx,0x0
jmp jmp2
loop2:
mov eax,jiamalen
sub eax,ecx
mov esi,p2
xor al,byte ptr ds:
add edx,eax
inc ecx
jmp2:
cmp ecx,jiamalen
jb loop2
mov sum3,edx
}
__asm
{
mov edx,sum3
mov ecx,0x0
jmp jmp3
loop3:
mov eax,jiamalen
sub eax,ecx
mov esi,p2
xor al,byte ptr ds:
add edx,eax
inc ecx
jmp3:
cmp ecx,jiamalen
jb loop3
mov sum4,edx
}
__asm
{
mov edx,0
mov ecx,0x0
jmp jmp1
loop1:
mov eax,zhanghaolen
sub eax,ecx
mov esi,p
xor al,byte ptr ds:
add edx,eax
inc ecx
jmp1:
cmp ecx,zhanghaolen
jb loop1
mov sum2,edx
}
__asm
{
mov eax,sum4
mov ecx,sum2
cdq
idiv ecx
cmp eax,0xC0D
jnz exitCUOWU
cmp edx,0x7
jnz exitCUOWU
mov eax,0x00000000L
push eax
xor ebx,ebx
push ebx
mov byte ptr ,0x61
push 0x646e6150
mov eax,esp
push eax
push eax
push NULL
mov eax,0x77D507EA
calleax
exitCUOWU:
}
页:
[1]