|
通过vbs脚本或者E语言命令如何将网卡设置成自动获得IP?
netsh interface ip set address "本地连接" dhcp netsh interface ip set dns "本地连接" dhcp PRIMARY 复制保存为bat就OK,如果要写成vbs自己写下 |
|
[求助]求教汇编语句,CAll都跟出来了,盼望高人指点,感激不尽
以上的函数是什么意思?CALL都跟出来了,第一楼的是单独一个函数,二楼的第一是什么函数帮我分析下,谢谢,或者说想当于C++或者DELPHI的什么函数,望大牛能帮忙解答下,谢谢 |
|
[求助]求教汇编语句,CAll都跟出来了,盼望高人指点,感激不尽
004029F0 /$ 51 PUSH ECX ; MSVCR71.7C36BA48 004029F1 |. 8B4F 04 MOV ECX,DWORD PTR DS:[EDI+4] 004029F4 |. 8B07 MOV EAX,DWORD PTR DS:[EDI] 004029F6 |. 56 PUSH ESI 004029F7 |. 8BF1 MOV ESI,ECX 004029F9 |. 2BF0 SUB ESI,EAX 004029FB |. 3BD6 CMP EDX,ESI 004029FD |. C64424 04 00 MOV BYTE PTR SS:[ESP+4],0 00402A02 |. 73 1E JNB SHORT pwpack.00402A22 00402A04 |. 03C2 ADD EAX,EDX 00402A06 |. 3BC9 CMP ECX,ECX 00402A08 |. 74 12 JE SHORT pwpack.00402A1C 00402A0A |. 8BF1 MOV ESI,ECX 00402A0C |. 2BF1 SUB ESI,ECX 00402A0E |. 56 PUSH ESI ; /n 00402A0F |. 51 PUSH ECX ; |src 00402A10 |. 50 PUSH EAX ; |dest 00402A11 |. FF15 6CB04000 CALL DWORD PTR DS:[<&MSVCR71.memmove>] ; \memmove 00402A17 |. 83C4 0C ADD ESP,0C 00402A1A |. 03C6 ADD EAX,ESI 00402A1C |> 8947 04 MOV DWORD PTR DS:[EDI+4],EAX 00402A1F |. 5E POP ESI 00402A20 |. 59 POP ECX 00402A21 |. C3 RETN 00402A22 |> 8D7424 04 LEA ESI,DWORD PTR SS:[ESP+4] 00402A26 |. 56 PUSH ESI 00402A27 |. 2BC1 SUB EAX,ECX 00402A29 |. 51 PUSH ECX 00402A2A |. 03C2 ADD EAX,EDX 00402A2C |. 57 PUSH EDI 00402A2D |. E8 4E020000 CALL pwpack.00402C80 ;//这个函数在下面[二] 00402A32 |. 5E POP ESI 00402A33 |. 59 POP ECX 00402A34 \. C3 RETN ---------------------------[二]------------------------------------------ 00402C80 /$ 51 PUSH ECX 00402C81 |. 53 PUSH EBX 00402C82 |. 8B5C24 10 MOV EBX,DWORD PTR SS:[ESP+10] 00402C86 |. 55 PUSH EBP 00402C87 |. 8B6C24 18 MOV EBP,DWORD PTR SS:[ESP+18] 00402C8B |. 56 PUSH ESI 00402C8C |. 8BF0 MOV ESI,EAX 00402C8E |. 85F6 TEST ESI,ESI 00402C90 |. 57 PUSH EDI 00402C91 |. 8B7C24 18 MOV EDI,DWORD PTR SS:[ESP+18] 00402C95 |. 0F84 F9000000 JE pwpack.00402D94 00402C9B |. 8B47 04 MOV EAX,DWORD PTR DS:[EDI+4] 00402C9E |. 8B4F 08 MOV ECX,DWORD PTR DS:[EDI+8] 00402CA1 |. 2BC8 SUB ECX,EAX 00402CA3 |. 3BCE CMP ECX,ESI 00402CA5 |. 0F82 DE000000 JB pwpack.00402D89 00402CAB |. 8A4D 00 MOV CL,BYTE PTR SS:[EBP] 00402CAE |. 8B6F 04 MOV EBP,DWORD PTR DS:[EDI+4] 00402CB1 |. 2BC3 SUB EAX,EBX 00402CB3 |. 3BC6 CMP EAX,ESI 00402CB5 |. 884C24 20 MOV BYTE PTR SS:[ESP+20],CL 00402CB9 |. 894424 10 MOV DWORD PTR SS:[ESP+10],EAX 00402CBD |. 76 5E JBE SHORT pwpack.00402D1D 00402CBF |. 8BC5 MOV EAX,EBP 00402CC1 |. 2BC6 SUB EAX,ESI 00402CC3 |. 3BE8 CMP EBP,EAX 00402CC5 |. 74 10 JE SHORT pwpack.00402CD7 00402CC7 |. 8BD5 MOV EDX,EBP 00402CC9 |. 2BD0 SUB EDX,EAX 00402CCB |. 52 PUSH EDX ; /n 00402CCC |. 50 PUSH EAX ; |src 00402CCD |. 55 PUSH EBP ; |dest 00402CCE |. FF15 6CB04000 CALL DWORD PTR DS:[<&MSVCR71.memmove>] ; \memmove 00402CD4 |. 83C4 0C ADD ESP,0C 00402CD7 |> 0177 04 ADD DWORD PTR DS:[EDI+4],ESI 00402CDA |. 8BC5 MOV EAX,EBP 00402CDC |. 2BC3 SUB EAX,EBX 00402CDE |. 2BC6 SUB EAX,ESI 00402CE0 |. 85C0 TEST EAX,EAX 00402CE2 |. 7E 0E JLE SHORT pwpack.00402CF2 00402CE4 |. 50 PUSH EAX ; /n 00402CE5 |. 2BE8 SUB EBP,EAX ; | 00402CE7 |. 53 PUSH EBX ; |src 00402CE8 |. 55 PUSH EBP ; |dest 00402CE9 |. FF15 6CB04000 CALL DWORD PTR DS:[<&MSVCR71.memmove>] ; \memmove 00402CEF |. 83C4 0C ADD ESP,0C 00402CF2 |> 0FB64424 20 MOVZX EAX,BYTE PTR SS:[ESP+20] 00402CF7 |. 8BCE MOV ECX,ESI 00402CF9 |. 8BFB MOV EDI,EBX 00402CFB |> 8AD8 MOV BL,AL 00402CFD |. 8AFB MOV BH,BL 00402CFF |. 8BD1 MOV EDX,ECX 00402D01 |. C1E9 02 SHR ECX,2 00402D04 |. 8BC3 MOV EAX,EBX 00402D06 |. C1E0 10 SHL EAX,10 00402D09 |. 66:8BC3 MOV AX,BX 00402D0C |. F3:AB REP STOS DWORD PTR ES:[EDI] 00402D0E |. 8BCA MOV ECX,EDX 00402D10 |. 83E1 03 AND ECX,3 00402D13 |. F3:AA REP STOS BYTE PTR ES:[EDI] 00402D15 |. 5F POP EDI 00402D16 |. 5E POP ESI 00402D17 |. 5D POP EBP 00402D18 |. 5B POP EBX 00402D19 |. 59 POP ECX 00402D1A |. C2 0C00 RETN 0C 00402D1D |> 0FB6D1 MOVZX EDX,CL 00402D20 |. 8BCE MOV ECX,ESI 00402D22 |. 2BC8 SUB ECX,EAX 00402D24 |. 8AC2 MOV AL,DL 00402D26 |. 8AD8 MOV BL,AL 00402D28 |. 8AFB MOV BH,BL 00402D2A |. 895424 20 MOV DWORD PTR SS:[ESP+20],EDX 00402D2E |. 8BD1 MOV EDX,ECX 00402D30 |. C1E9 02 SHR ECX,2 00402D33 |. 8BFD MOV EDI,EBP 00402D35 |. 8BC3 MOV EAX,EBX 00402D37 |. C1E0 10 SHL EAX,10 00402D3A |. 66:8BC3 MOV AX,BX 00402D3D |. 8B5C24 18 MOV EBX,DWORD PTR SS:[ESP+18] 00402D41 |. F3:AB REP STOS DWORD PTR ES:[EDI] 00402D43 |. 8BCA MOV ECX,EDX 00402D45 |. 83E1 03 AND ECX,3 00402D48 |. F3:AA REP STOS BYTE PTR ES:[EDI] 00402D4A |. 8B7C24 10 MOV EDI,DWORD PTR SS:[ESP+10] 00402D4E |. 8B53 04 MOV EDX,DWORD PTR DS:[EBX+4] 00402D51 |. 2BF7 SUB ESI,EDI 00402D53 |. 03D6 ADD EDX,ESI 00402D55 |. 8B7424 1C MOV ESI,DWORD PTR SS:[ESP+1C] 00402D59 |. 3BEE CMP EBP,ESI 00402D5B |. 8953 04 MOV DWORD PTR DS:[EBX+4],EDX 00402D5E |. 8BC2 MOV EAX,EDX 00402D60 |. 74 10 JE SHORT pwpack.00402D72 00402D62 |. 8BCD MOV ECX,EBP 00402D64 |. 2BCE SUB ECX,ESI 00402D66 |. 51 PUSH ECX ; /n 00402D67 |. 56 PUSH ESI ; |src 00402D68 |. 50 PUSH EAX ; |dest 00402D69 |. FF15 6CB04000 CALL DWORD PTR DS:[<&MSVCR71.memmove>] ; \memmove 00402D6F |. 83C4 0C ADD ESP,0C 00402D72 |> 8B43 04 MOV EAX,DWORD PTR DS:[EBX+4] 00402D75 |. 03C7 ADD EAX,EDI 00402D77 |. 8BCD MOV ECX,EBP 00402D79 |. 8943 04 MOV DWORD PTR DS:[EBX+4],EAX 00402D7C |. 8A4424 20 MOV AL,BYTE PTR SS:[ESP+20] 00402D80 |. 2BCE SUB ECX,ESI 00402D82 |. 8BFE MOV EDI,ESI 00402D84 |.^E9 72FFFFFF JMP pwpack.00402CFB 00402D89 |> 6A 00 PUSH 0 00402D8B |. 56 PUSH ESI 00402D8C |. 55 PUSH EBP 00402D8D |. 53 PUSH EBX 00402D8E |. 57 PUSH EDI 00402D8F |. E8 2C010000 CALL pwpack.00402EC0 ;/在[三] 00402D94 |> 5F POP EDI 00402D95 |. 5E POP ESI 00402D96 |. 5D POP EBP 00402D97 |. 5B POP EBX 00402D98 |. 59 POP ECX 00402D99 \. C2 0C00 RETN 0C -------------------------------------------------[三]------------------------------------------- 00402EC0 /$ 51 PUSH ECX 00402EC1 |. 53 PUSH EBX 00402EC2 |. 8B5C24 18 MOV EBX,DWORD PTR SS:[ESP+18] 00402EC6 |. 55 PUSH EBP 00402EC7 |. 8B6C24 10 MOV EBP,DWORD PTR SS:[ESP+10] 00402ECB |. 8B45 04 MOV EAX,DWORD PTR SS:[EBP+4] 00402ECE |. 2B45 00 SUB EAX,DWORD PTR SS:[EBP] 00402ED1 |. 3BC3 CMP EAX,EBX 00402ED3 |. 56 PUSH ESI 00402ED4 |. 57 PUSH EDI 00402ED5 |. 8B7C24 1C MOV EDI,DWORD PTR SS:[ESP+1C] 00402ED9 |. 894424 18 MOV DWORD PTR SS:[ESP+18],EAX 00402EDD |. 8D4C24 24 LEA ECX,DWORD PTR SS:[ESP+24] 00402EE1 |. 72 04 JB SHORT pwpack.00402EE7 00402EE3 |. 8D4C24 18 LEA ECX,DWORD PTR SS:[ESP+18] 00402EE7 |> 8B09 MOV ECX,DWORD PTR DS:[ECX] 00402EE9 |. 03C8 ADD ECX,EAX 00402EEB |. 894C24 10 MOV DWORD PTR SS:[ESP+10],ECX 00402EEF |. 74 0D JE SHORT pwpack.00402EFE 00402EF1 |. 51 PUSH ECX 00402EF2 |. E8 111A0000 CALL pwpack.00404908 ;//这个CALL在[四] 00402EF7 |. 83C4 04 ADD ESP,4 00402EFA |. 8BF0 MOV ESI,EAX 00402EFC |. EB 02 JMP SHORT pwpack.00402F00 00402EFE |> 33F6 XOR ESI,ESI 00402F00 |> 8B45 00 MOV EAX,DWORD PTR SS:[EBP] 00402F03 |. 3BF8 CMP EDI,EAX 00402F05 |. 897424 18 MOV DWORD PTR SS:[ESP+18],ESI 00402F09 |. 74 12 JE SHORT pwpack.00402F1D 00402F0B |. 2BF8 SUB EDI,EAX 00402F0D |. 57 PUSH EDI ; /n 00402F0E |. 50 PUSH EAX ; |src 00402F0F |. 56 PUSH ESI ; |dest 00402F10 |. FF15 6CB04000 CALL DWORD PTR DS:[<&MSVCR71.memmove>] ; \memmove 00402F16 |. 8BF0 MOV ESI,EAX 00402F18 |. 83C4 0C ADD ESP,0C 00402F1B |. 03F7 ADD ESI,EDI 00402F1D |> 8B4424 20 MOV EAX,DWORD PTR SS:[ESP+20] 00402F21 |. 0FB600 MOVZX EAX,BYTE PTR DS:[EAX] 00402F24 |. 8BCB MOV ECX,EBX 00402F26 |. 8AD8 MOV BL,AL 00402F28 |. 8AFB MOV BH,BL 00402F2A |. 8BD1 MOV EDX,ECX 00402F2C |. C1E9 02 SHR ECX,2 00402F2F |. 8BFE MOV EDI,ESI 00402F31 |. 8BC3 MOV EAX,EBX 00402F33 |. C1E0 10 SHL EAX,10 00402F36 |. 66:8BC3 MOV AX,BX 00402F39 |. F3:AB REP STOS DWORD PTR ES:[EDI] 00402F3B |. 8BCA MOV ECX,EDX 00402F3D |. 83E1 03 AND ECX,3 00402F40 |. F3:AA REP STOS BYTE PTR ES:[EDI] 00402F42 |. 8B4C24 24 MOV ECX,DWORD PTR SS:[ESP+24] 00402F46 |. 8A4424 28 MOV AL,BYTE PTR SS:[ESP+28] 00402F4A |. 03F1 ADD ESI,ECX 00402F4C |. 84C0 TEST AL,AL 00402F4E |. 75 1D JNZ SHORT pwpack.00402F6D 00402F50 |. 8B7D 04 MOV EDI,DWORD PTR SS:[EBP+4] 00402F53 |. 8B4424 1C MOV EAX,DWORD PTR SS:[ESP+1C] 00402F57 |. 3BF8 CMP EDI,EAX 00402F59 |. 74 12 JE SHORT pwpack.00402F6D 00402F5B |. 2BF8 SUB EDI,EAX 00402F5D |. 57 PUSH EDI ; /n 00402F5E |. 50 PUSH EAX ; |src 00402F5F |. 56 PUSH ESI ; |dest 00402F60 |. FF15 6CB04000 CALL DWORD PTR DS:[<&MSVCR71.memmove>] ; \memmove 00402F66 |. 83C4 0C ADD ESP,0C 00402F69 |. 03C7 ADD EAX,EDI 00402F6B |. 8BF0 MOV ESI,EAX 00402F6D |> 8B45 00 MOV EAX,DWORD PTR SS:[EBP] 00402F70 |. 85C0 TEST EAX,EAX 00402F72 |. 74 09 JE SHORT pwpack.00402F7D 00402F74 |. 50 PUSH EAX 00402F75 |. E8 02770000 CALL <JMP.&MSVCR71.??3@YAXPAX@Z> 00402F7A |. 83C4 04 ADD ESP,4 00402F7D |> 8B4424 18 MOV EAX,DWORD PTR SS:[ESP+18] 00402F81 |. 8B4C24 10 MOV ECX,DWORD PTR SS:[ESP+10] 00402F85 |. 5F POP EDI 00402F86 |. 8945 00 MOV DWORD PTR SS:[EBP],EAX 00402F89 |. 8975 04 MOV DWORD PTR SS:[EBP+4],ESI 00402F8C |. 03C1 ADD EAX,ECX 00402F8E |. 5E POP ESI 00402F8F |. 8945 08 MOV DWORD PTR SS:[EBP+8],EAX 00402F92 |. 5D POP EBP 00402F93 |. 5B POP EBX 00402F94 |. 59 POP ECX 00402F95 \. C2 1400 RETN 14 --------------------------------------------------------[四]----------------------------------------------------- 00404908 /$ 56 PUSH ESI 00404909 |. 8B7424 08 MOV ESI,DWORD PTR SS:[ESP+8] 0040490D |. EB 11 JMP SHORT pwpack.00404920 0040490F |> 56 /PUSH ESI 00404910 |. E8 D15F0000 |CALL <JMP.&MSVCR71._callnewh> 00404915 |. 85C0 |TEST EAX,EAX 00404917 |. 59 |POP ECX 00404918 |. 75 06 |JNZ SHORT pwpack.00404920 0040491A |. FF15 18B04000 |CALL DWORD PTR DS:[<&MSVCP71.?_Nomemory>; MSVCP71.?_Nomemory@std@@YAXXZ 00404920 |> 56 PUSH ESI ; /size 00404921 |. E8 AE5F0000 |CALL <JMP.&MSVCR71.malloc> ; \malloc 00404926 |. 85C0 |TEST EAX,EAX 00404928 |. 59 |POP ECX 00404929 |.^74 E4 \JE SHORT pwpack.0040490F 0040492B |. 5E POP ESI 0040492C \. C3 RETN |
|
[求助]求教简单汇编代码的ESP栈值
望大牛能帮忙解答 |
|
[挑战]一段读取文件的汇编代码供分析
在新手区,大牛都不看吗?我相信以上代码对大牛来说是超简单的,我刚学汇编,被ESP指针寄存搞糊涂了,看不下去了 |
|
[求助]关于PCK文件解压包程序的逆向分析(附程序)
楼上说的很有道理,但得看他们有没有时间 |
|
[求助]vc++ 8.0 写的程序,请问如何找到他的主窗口的标题字符
标题应该是16进制的?并不是明文 |
操作理由
RANk
{{ user_info.golds == '' ? 0 : user_info.golds }}
雪币
{{ experience }}
课程经验
{{ score }}
学习收益
{{study_duration_fmt}}
学习时长
基本信息
荣誉称号:
{{ honorary_title }}
能力排名:
No.{{ rank_num }}
等 级:
LV{{ rank_lv-100 }}
活跃值:
在线值:
浏览人数:{{ visits }}
最近活跃:{{ last_active_time }}
注册时间:{{ user_info.create_date_jsonfmt }}
勋章
兑换勋章
证书
证书查询 >
能力值