CrackMe 1类CM【by JinGuiZi】
本帖最后由 JoyChou 于 2013-7-12 12:01 编辑觉得思路不错。
程序源码:
004015BB /75 15 jnz XJinGuiZi.004015D2好像是这个
支持下呵呵 1354669803 发表于 2013-7-9 23:44 static/image/common/back.gif
004015BB /75 15 jnz XJinGuiZi.004015D2好像是这个
尴尬,目的不是爆破啦。
没对字符串加密,没对断点检测,
而且还是MessageBox~
这个用来做什么的 lyxswgdjd 发表于 2013-7-9 23:54 static/image/common/back.gif
这个用来做什么的
Have Fun
1,3,5,6,8,12{:1_931:} 004015A1 .8BF1 mov esi,ecx
004015A3 .8D46 64 lea eax,dword ptr ds:
004015A6 .50 push eax
004015A7 .E8 44000000 call JinGuiZi.004015F0
004015AC .83C4 04 add esp,0x4
004015AF .3D B5080000 cmp eax,0x8B5
004015B4 .8946 60 mov dword ptr ds:,eax
004015B7 .6A 00 push 0x0
004015B9 .6A 00 push 0x0
004015BB .75 15 jnz XJinGuiZi.004015D2
004015BD .68 2C304000 push JinGuiZi.0040302C ;ASCII "GoodJob!"
004015C2 .8BCE mov ecx,esi
004015C4 .E8 6F020000 call <jmp.&MFC42.#4224>
004015C9 .8B16 mov edx,dword ptr ds:
004015CB .8BCE mov ecx,esi
004015CD .FF52 60 call dword ptr ds:
004015D0 .5E pop esi
004015D1 .C3 retn
004015D2 >68 20304000 push JinGuiZi.00403020 ;ASCII "Try Again!"
004015D7 .8BCE mov ecx,esi
004015D9 .E8 5A020000 call <jmp.&MFC42.#4224>
004015DE .8B06 mov eax,dword ptr ds:
004015E0 .8BCE mov ecx,esi
004015E2 .FF50 60 call dword ptr ds:
004015E5 .5E pop esi
004015E6 .C3 retn
RedAngel丶 发表于 2013-7-10 01:18 static/image/common/back.gif
1,3,5,6,8,12
well done
页:
[1]
2