|
|
[求助]哪位会Delphi的朋友帮忙将这两个c++函数给转换成Delphi?
现在的关键就是delphi中,无法取得驱动中写回的信息,就是通过DeviceIoControl(device,1000,controlbuff,256,controlbuff,256,&dw,0)中,controlbuff指定的一个指针地址的值取不到,郁闷。。。 |
|
|
[分享]中秋好礼相送,电子杂志《软件安全》01期
多谢提供 !! |
|
|
call $+5在汇编中为什么不认?
我在od中输入,提示好像是:Unrecognized operand!,版主请教了。 |
|
|
刚学跟踪,正在跟一个国外的服装cad软件,困惑中,谁有这方面的经历!
我的是用反编译软件编译后,将他们黏贴出来的。很简单 |
|
|
|
|
|
刚学跟踪,正在跟一个国外的服装cad软件,困惑中,谁有这方面的经历!
罗降神兄, kingday兄可不可以留个联系方式? |
|
|
|
|
|
各位,请问有狗的软件,在跟踪的时候如何跟?
我试过了,根本进入不了程序的领空/ |
|
|
刚学跟踪,正在跟一个国外的服装cad软件,困惑中,谁有这方面的经历!
0045ABCE |. 81E2 FF000000 AND EDX,0FF 0045ABD4 |. 85D2 TEST EDX,EDX 0045ABD6 |. 0F84 22020000 JE PAD_Syst.0045ADFE 0045ABDC |. C645 EC 00 MOV BYTE PTR SS:[EBP-14],0 0045ABE0 |. 8B45 08 MOV EAX,DWORD PTR SS:[EBP+8] 0045ABE3 |. 33C9 XOR ECX,ECX 0045ABE5 |. 8A48 02 MOV CL,BYTE PTR DS:[EAX+2] 0045ABE8 |. 83F9 41 CMP ECX,41 0045ABEB |. 75 22 JNZ SHORT PAD_Syst.0045AC0F 0045ABED |. 6A 0B PUSH 0B ; /Arg7 = 0000000B 0045ABEF |. 6A 08 PUSH 8 ; |Arg6 = 00000008 0045ABF1 |. 6A 06 PUSH 6 ; |Arg5 = 00000006 0045ABF3 |. 6A 09 PUSH 9 ; |Arg4 = 00000009 0045ABF5 |. 6A 05 PUSH 5 ; |Arg3 = 00000005 0045ABF7 |. 6A 03 PUSH 3 ; |Arg2 = 00000003 0045ABF9 |. 8B55 0C MOV EDX,DWORD PTR SS:[EBP+C] ; | 0045ABFC |. 52 PUSH EDX ; |Arg1 0045ABFD |. E8 04020000 CALL PAD_Syst.0045AE06 ; \PAD_Syst.0045AE06 0045AC02 |. 83C4 1C ADD ESP,1C 0045AC05 |. 66:C745 E8 040>MOV WORD PTR SS:[EBP-18],4 0045AC0B |. C645 EC 01 MOV BYTE PTR SS:[EBP-14],1 0045AC0F |> 8B45 08 MOV EAX,DWORD PTR SS:[EBP+8] 0045AC12 |. 33C9 XOR ECX,ECX 0045AC14 |. 8A48 02 MOV CL,BYTE PTR DS:[EAX+2] 0045AC17 |. 83F9 42 CMP ECX,42 0045AC1A |. 75 22 JNZ SHORT PAD_Syst.0045AC3E 0045AC1C |. 6A 05 PUSH 5 ; /Arg7 = 00000005 0045AC1E |. 6A 09 PUSH 9 ; |Arg6 = 00000009 0045AC20 |. 6A 0C PUSH 0C ; |Arg5 = 0000000C 0045AC22 |. 6A 04 PUSH 4 ; |Arg4 = 00000004 0045AC24 |. 6A 07 PUSH 7 ; |Arg3 = 00000007 0045AC26 |. 6A 03 PUSH 3 ; |Arg2 = 00000003 0045AC28 |. 8B55 0C MOV EDX,DWORD PTR SS:[EBP+C] ; | 0045AC2B |. 52 PUSH EDX ; |Arg1 0045AC2C |. E8 D5010000 CALL PAD_Syst.0045AE06 ; \PAD_Syst.0045AE06 0045AC31 |. 83C4 1C ADD ESP,1C 0045AC34 |. 66:C745 E8 020>MOV WORD PTR SS:[EBP-18],2 0045AC3A |. C645 EC 01 MOV BYTE PTR SS:[EBP-14],1 0045AC3E |> 8B45 08 MOV EAX,DWORD PTR SS:[EBP+8] 0045AC41 |. 33C9 XOR ECX,ECX 0045AC43 |. 8A48 02 MOV CL,BYTE PTR DS:[EAX+2] 0045AC46 |. 83F9 43 CMP ECX,43 0045AC49 |. 75 22 JNZ SHORT PAD_Syst.0045AC6D 0045AC4B |. 6A 0C PUSH 0C ; /Arg7 = 0000000C 0045AC4D |. 6A 0A PUSH 0A ; |Arg6 = 0000000A 0045AC4F |. 6A 06 PUSH 6 ; |Arg5 = 00000006 0045AC51 |. 6A 0B PUSH 0B ; |Arg4 = 0000000B 0045AC53 |. 6A 07 PUSH 7 ; |Arg3 = 00000007 0045AC55 |. 6A 05 PUSH 5 ; |Arg2 = 00000005 0045AC57 |. 8B55 0C MOV EDX,DWORD PTR SS:[EBP+C] ; | 0045AC5A |. 52 PUSH EDX ; |Arg1 0045AC5B |. E8 A6010000 CALL PAD_Syst.0045AE06 ; \PAD_Syst.0045AE06 0045AC60 |. 83C4 1C ADD ESP,1C 0045AC63 |. 66:C745 E8 030>MOV WORD PTR SS:[EBP-18],3 0045AC69 |. C645 EC 01 MOV BYTE PTR SS:[EBP-14],1 0045AC6D |> 8B45 08 MOV EAX,DWORD PTR SS:[EBP+8] 0045AC70 |. 33C9 XOR ECX,ECX 0045AC72 |. 8A48 02 MOV CL,BYTE PTR DS:[EAX+2] 0045AC75 |. 83F9 44 CMP ECX,44 0045AC78 |. 75 22 JNZ SHORT PAD_Syst.0045AC9C 0045AC7A |. 6A 0B PUSH 0B ; /Arg7 = 0000000B 0045AC7C |. 6A 07 PUSH 7 ; |Arg6 = 00000007 0045AC7E |. 6A 08 PUSH 8 ; |Arg5 = 00000008 0045AC80 |. 6A 09 PUSH 9 ; |Arg4 = 00000009 0045AC82 |. 6A 04 PUSH 4 ; |Arg3 = 00000004 0045AC84 |. 6A 03 PUSH 3 ; |Arg2 = 00000003 0045AC86 |. 8B55 0C MOV EDX,DWORD PTR SS:[EBP+C] ; | 0045AC89 |. 52 PUSH EDX ; |Arg1 0045AC8A |. E8 77010000 CALL PAD_Syst.0045AE06 ; \PAD_Syst.0045AE06 0045AC8F |. 83C4 1C ADD ESP,1C 0045AC92 |. 66:C745 E8 010>MOV WORD PTR SS:[EBP-18],1 0045AC98 |. C645 EC 01 MOV BYTE PTR SS:[EBP-14],1 0045AC9C |> 8B45 08 MOV EAX,DWORD PTR SS:[EBP+8] 0045AC9F |. 33C9 XOR ECX,ECX 0045ACA1 |. 8A48 02 MOV CL,BYTE PTR DS:[EAX+2] 0045ACA4 |. 83F9 45 CMP ECX,45 0045ACA7 |. 75 22 JNZ SHORT PAD_Syst.0045ACCB 0045ACA9 |. 6A 0C PUSH 0C ; /Arg7 = 0000000C 0045ACAB |. 6A 07 PUSH 7 ; |Arg6 = 00000007 0045ACAD |. 6A 09 PUSH 9 ; |Arg5 = 00000009 0045ACAF |. 6A 0A PUSH 0A ; |Arg4 = 0000000A 0045ACB1 |. 6A 06 PUSH 6 ; |Arg3 = 00000006 0045ACB3 |. 6A 03 PUSH 3 ; |Arg2 = 00000003 0045ACB5 |. 8B55 0C MOV EDX,DWORD PTR SS:[EBP+C] ; | 0045ACB8 |. 52 PUSH EDX ; |Arg1 0045ACB9 |. E8 48010000 CALL PAD_Syst.0045AE06 ; \PAD_Syst.0045AE06 0045ACBE |. 83C4 1C ADD ESP,1C 0045ACC1 |. 66:C745 E8 000>MOV WORD PTR SS:[EBP-18],0 0045ACC7 |. C645 EC 01 MOV BYTE PTR SS:[EBP-14],1 0045ACCB |> 8B45 08 MOV EAX,DWORD PTR SS:[EBP+8] 0045ACCE |. 33C9 XOR ECX,ECX 0045ACD0 |. 8A48 02 MOV CL,BYTE PTR DS:[EAX+2] 0045ACD3 |. 83F9 46 CMP ECX,46 0045ACD6 |. 75 22 JNZ SHORT PAD_Syst.0045ACFA 0045ACD8 |. 6A 0B PUSH 0B ; /Arg7 = 0000000B 0045ACDA |. 6A 08 PUSH 8 ; |Arg6 = 00000008 0045ACDC |. 6A 04 PUSH 4 ; |Arg5 = 00000004 0045ACDE |. 6A 09 PUSH 9 ; |Arg4 = 00000009 0045ACE0 |. 6A 05 PUSH 5 ; |Arg3 = 00000005 0045ACE2 |. 6A 03 PUSH 3 ; |Arg2 = 00000003 0045ACE4 |. 8B55 0C MOV EDX,DWORD PTR SS:[EBP+C] ; | 0045ACE7 |. 52 PUSH EDX ; |Arg1 0045ACE8 |. E8 19010000 CALL PAD_Syst.0045AE06 ; \PAD_Syst.0045AE06 0045ACED |. 83C4 1C ADD ESP,1C 0045ACF0 |. 66:C745 E8 010>MOV WORD PTR SS:[EBP-18],1 0045ACF6 |. C645 EC 01 MOV BYTE PTR SS:[EBP-14],1 0045ACFA |> 8B45 08 MOV EAX,DWORD PTR SS:[EBP+8] 0045ACFD |. 33C9 XOR ECX,ECX 0045ACFF |. 8A48 02 MOV CL,BYTE PTR DS:[EAX+2] 0045AD02 |. 83F9 47 CMP ECX,47 0045AD05 |. 75 22 JNZ SHORT PAD_Syst.0045AD29 0045AD07 |. 6A 0C PUSH 0C ; /Arg7 = 0000000C 0045AD09 |. 6A 08 PUSH 8 ; |Arg6 = 00000008 0045AD0B |. 6A 06 PUSH 6 ; |Arg5 = 00000006 0045AD0D |. 6A 09 PUSH 9 ; |Arg4 = 00000009 0045AD0F |. 6A 07 PUSH 7 ; |Arg3 = 00000007 0045AD11 |. 6A 03 PUSH 3 ; |Arg2 = 00000003 0045AD13 |. 8B55 0C MOV EDX,DWORD PTR SS:[EBP+C] ; | 0045AD16 |. 52 PUSH EDX ; |Arg1 0045AD17 |. E8 EA000000 CALL PAD_Syst.0045AE06 ; \PAD_Syst.0045AE06 0045AD1C |. 83C4 1C ADD ESP,1C 0045AD1F |. 66:C745 E8 020>MOV WORD PTR SS:[EBP-18],2 0045AD25 |. C645 EC 01 MOV BYTE PTR SS:[EBP-14],1 0045AD29 |> 8B45 08 MOV EAX,DWORD PTR SS:[EBP+8] 0045AD2C |. 33C9 XOR ECX,ECX 0045AD2E |. 8A48 02 MOV CL,BYTE PTR DS:[EAX+2] 0045AD31 |. 83F9 48 CMP ECX,48 0045AD34 |. 75 22 JNZ SHORT PAD_Syst.0045AD58 0045AD36 |. 6A 08 PUSH 8 ; /Arg7 = 00000008 0045AD38 |. 6A 0B PUSH 0B ; |Arg6 = 0000000B 0045AD3A |. 6A 0C PUSH 0C ; |Arg5 = 0000000C 0045AD3C |. 6A 07 PUSH 7 ; |Arg4 = 00000007 0045AD3E |. 6A 04 PUSH 4 ; |Arg3 = 00000004 0045AD40 |. 6A 03 PUSH 3 ; |Arg2 = 00000003 0045AD42 |. 8B55 0C MOV EDX,DWORD PTR SS:[EBP+C] ; | 0045AD45 |. 52 PUSH EDX ; |Arg1 0045AD46 |. E8 BB000000 CALL PAD_Syst.0045AE06 ; \PAD_Syst.0045AE06 0045AD4B |. 83C4 1C ADD ESP,1C 0045AD4E |. 66:C745 E8 000>MOV WORD PTR SS:[EBP-18],0 0045AD54 |. C645 EC 01 MOV BYTE PTR SS:[EBP-14],1 0045AD58 |> 8B45 08 MOV EAX,DWORD PTR SS:[EBP+8] 0045AD5B |. 33C9 XOR ECX,ECX 0045AD5D |. 8A48 02 MOV CL,BYTE PTR DS:[EAX+2] 0045AD60 |. 83F9 49 CMP ECX,49 0045AD63 |. 75 22 JNZ SHORT PAD_Syst.0045AD87 0045AD65 |. 6A 0C PUSH 0C ; /Arg7 = 0000000C 0045AD67 |. 6A 08 PUSH 8 ; |Arg6 = 00000008 0045AD69 |. 6A 07 PUSH 7 ; |Arg5 = 00000007 0045AD6B |. 6A 09 PUSH 9 ; |Arg4 = 00000009 0045AD6D |. 6A 05 PUSH 5 ; |Arg3 = 00000005 0045AD6F |. 6A 03 PUSH 3 ; |Arg2 = 00000003 0045AD71 |. 8B55 0C MOV EDX,DWORD PTR SS:[EBP+C] ; | 0045AD74 |. 52 PUSH EDX ; |Arg1 0045AD75 |. E8 8C000000 CALL PAD_Syst.0045AE06 ; \PAD_Syst.0045AE06 0045AD7A |. 83C4 1C ADD ESP,1C 0045AD7D |. 66:C745 E8 040>MOV WORD PTR SS:[EBP-18],4 0045AD83 |. C645 EC 01 MOV BYTE PTR SS:[EBP-14],1 0045AD87 |> 8B45 08 MOV EAX,DWORD PTR SS:[EBP+8] 0045AD8A |. 33C9 XOR ECX,ECX 0045AD8C |. 8A48 02 MOV CL,BYTE PTR DS:[EAX+2] 0045AD8F |. 83F9 4A CMP ECX,4A 0045AD92 |. 75 22 JNZ SHORT PAD_Syst.0045ADB6 0045AD94 |. 6A 0C PUSH 0C ; /Arg7 = 0000000C 0045AD96 |. 6A 08 PUSH 8 ; |Arg6 = 00000008 0045AD98 |. 6A 05 PUSH 5 ; |Arg5 = 00000005 0045AD9A |. 6A 0A PUSH 0A ; |Arg4 = 0000000A 0045AD9C |. 6A 06 PUSH 6 ; |Arg3 = 00000006 0045AD9E |. 6A 03 PUSH 3 ; |Arg2 = 00000003 0045ADA0 |. 8B55 0C MOV EDX,DWORD PTR SS:[EBP+C] ; | 0045ADA3 |. 52 PUSH EDX ; |Arg1 0045ADA4 |. E8 5D000000 CALL PAD_Syst.0045AE06 ; \PAD_Syst.0045AE06 0045ADA9 |. 83C4 1C ADD ESP,1C 0045ADAC |. 66:C745 E8 030>MOV WORD PTR SS:[EBP-18],3 0045ADB2 |. C645 EC 01 MOV BYTE PTR SS:[EBP-14],1 0045ADB6 |> 8B45 EC MOV EAX,DWORD PTR SS:[EBP-14] 0045ADB9 |. 25 FF000000 AND EAX,0FF 0045ADBE |. 85C0 TEST EAX,EAX 0045ADC0 |. 74 3C JE SHORT PAD_Syst.0045ADFE |
|
|
|
操作理由
RANk
{{ user_info.golds == '' ? 0 : user_info.golds }}
雪币
{{ experience }}
课程经验
{{ score }}
学习收益
{{study_duration_fmt}}
学习时长
基本信息
荣誉称号:
{{ honorary_title }}
勋章
兑换勋章
证书
证书查询 >
能力值