好友
阅读权限10
听众
最后登录1970-1-1
|
不懂算法的我,只能用爆破,现在的思路是找到调用这个地址的地方 004029AF . E8 16FFFFFF call CrackMe.004028CA ,然后在往上找,估计能找到算法了位置了,好像这个调用这个位置的没有找到,我估计是一个直接的CALL过来的,
004028CA /$ 55 push ebp
004028CB |. 8BEC mov ebp,esp
004028CD |. 81EC 08000000 sub esp,0x8
004028D3 |. 68 01030080 push 0x80000301
004028D8 |. 6A 00 push 0x0
004028DA |. 68 02000000 push 0x2
004028DF |. 68 04000080 push 0x80000004
004028E4 |. 6A 00 push 0x0
004028E6 |. A1 50F24C00 mov eax,dword ptr ds:[0x4CF250]
004028EB |. 85C0 test eax,eax
004028ED |. 75 05 jnz short CrackMe.004028F4
004028EF |. B8 0A6F4800 mov eax,CrackMe.00486F0A
004028F4 |> 50 push eax
004028F5 |. 68 05000080 push 0x80000005
004028FA |. 6A 00 push 0x0
004028FC |. 68 C4874A00 push CrackMe.004A87C4
00402901 |. 68 03000000 push 0x3
00402906 |. B8 01000000 mov eax,0x1
0040290B |. BB D0174600 mov ebx,CrackMe.004617D0
00402910 |. E8 60010000 call CrackMe.00402A75
00402915 |. 83C4 28 add esp,0x28
00402918 |. 8945 FC mov [local.1],eax
0040291B |. 68 05000080 push 0x80000005
00402920 |. 6A 00 push 0x0
00402922 |. 8B45 FC mov eax,[local.1]
00402925 |. 85C0 test eax,eax
00402927 |. 75 05 jnz short CrackMe.0040292E
00402929 |. B8 336F4800 mov eax,CrackMe.00486F33
0040292E |> 50 push eax
0040292F |. 68 01000000 push 0x1
00402934 |. BB 70314000 mov ebx,CrackMe.00403170
00402939 |. E8 31010000 call CrackMe.00402A6F
0040293E |. 83C4 10 add esp,0x10
00402941 |. 8945 F8 mov [local.2],eax
00402944 |. 8B5D FC mov ebx,[local.1]
00402947 |. 85DB test ebx,ebx
00402949 |. 74 09 je short CrackMe.00402954
0040294B |. 53 push ebx
0040294C |. E8 12010000 call CrackMe.00402A63
00402951 |. 83C4 04 add esp,0x4
00402954 |> 6A 00 push 0x0
00402956 |. 6A 00 push 0x0
00402958 |. 6A 00 push 0x0
0040295A |. 68 04000080 push 0x80000004
0040295F |. 6A 00 push 0x0
00402961 |. 68 D4874A00 push CrackMe.004A87D4 ; Congratulations!!
00402966 |. 68 01030080 push 0x80000301
0040296B |. 6A 00 push 0x0
0040296D |. 68 40000000 push 0x40
00402972 |. 68 04000080 push 0x80000004
00402977 |. 6A 00 push 0x0
00402979 |. 8B45 F8 mov eax,[local.2] ; kernel32.7C817080
0040297C |. 85C0 test eax,eax
0040297E |. 75 05 jnz short CrackMe.00402985
00402980 |. B8 0A6F4800 mov eax,CrackMe.00486F0A
00402985 |> 50 push eax
00402986 |. 68 04000000 push 0x4
0040298B |. BB 40344000 mov ebx,CrackMe.00403440
00402990 |. E8 DA000000 call CrackMe.00402A6F
00402995 |. 83C4 34 add esp,0x34
00402998 |. 8B5D F8 mov ebx,[local.2] ; kernel32.7C817080
0040299B |. 85DB test ebx,ebx
0040299D |. 74 09 je short CrackMe.004029A8
0040299F |. 53 push ebx
004029A0 |. E8 BE000000 call CrackMe.00402A63
004029A5 |. 83C4 04 add esp,0x4
004029A8 |> 8BE5 mov esp,ebp
004029AA |. 5D pop ebp ; kernel32.7C817077
004029AB \. C3 retn
004029AC . 56 push esi
004029AD . 57 push edi
004029AE . 53 push ebx
004029AF . E8 16FFFFFF call CrackMe.004028CA
|
|