|
[转帖].Net Assembly Rebuilder v1.0 by bigmouse
新版1.2的出来了,楼主再发一个,嘿嘿 |
|
[分享]周杰伦2010年新专辑主打歌
最恨这个周杰龙了,不喜欢他 |
|
[灌水]这年头自杀的方式是越来越有才了
易经中说过,物极必反 |
|
[注意]十周年活动,想上台唱歌可以联系我
我唱的太好了,不敢上台,怕我一个人唱,别人就不敢唱了 |
|
[求助]找高手 帮帮看下 这是什么壳
VMP找NOOBY吧,呵呵 |
|
[讨论]甘肃的请进qq群:83470152交流!
我是武威的,你在武威? |
|
|
|
|
|
|
|
[已结束][PEDIY.华章 Crackme 竞赛 2009] [第十九回] –网络骑士团
0012F59C 59 00 00 00 D7 A2 B2 E1 B3 C9 B9 A6 A3 A1 00 00 Y...注册成功!.. 0012F5AC B9 A7 CF B2 00 00 00 00 00 00 00 00 75 5D 4B 4B 恭喜........u]KK |
|
[已结束][PEDIY.华章 Crackme 竞赛 2009] [第十九回] –网络骑士团
004013B0 /. 55 push ebp 004013B1 |. 8BEC mov ebp,esp 004013B3 |. 83E4 F8 and esp,FFFFFFF8 004013B6 |. 6A FF push -1 004013B8 |. 68 A6364200 push CrackMe.004236A6 004013BD |. 64:A1 00000000 mov eax,dword ptr fs:[0] 004013C3 |. 50 push eax 004013C4 |. 81EC 70020000 sub esp,270 004013CA |. A1 F0CB4200 mov eax,dword ptr ds:[42CBF0] 004013CF |. 33C4 xor eax,esp 004013D1 |. 898424 68020000 mov dword ptr ss:[esp+268],eax 004013D8 |. 53 push ebx 004013D9 |. 56 push esi 004013DA |. 57 push edi 004013DB |. A1 F0CB4200 mov eax,dword ptr ds:[42CBF0] 004013E0 |. 33C4 xor eax,esp 004013E2 |. 50 push eax 004013E3 |. 8D8424 80020000 lea eax,dword ptr ss:[esp+280] 004013EA |. 64:A3 00000000 mov dword ptr fs:[0],eax 004013F0 |. 33C0 xor eax,eax 004013F2 |. 68 FF000000 push 0FF 004013F7 |. 50 push eax 004013F8 |. 894424 49 mov dword ptr ss:[esp+49],eax 004013FC |. 894424 4D mov dword ptr ss:[esp+4D],eax 00401400 |. 66:894424 51 mov word ptr ss:[esp+51],ax 00401405 |. 884424 7C mov byte ptr ss:[esp+7C],al 00401409 |. 8D4424 7D lea eax,dword ptr ss:[esp+7D] 0040140D |. 8BD9 mov ebx,ecx 0040140F |. 50 push eax 00401410 |. 895C24 30 mov dword ptr ss:[esp+30],ebx 00401414 |. E8 C7F70000 call CrackMe.00410BE0 00401419 |. 68 FF000000 push 0FF 0040141E |. 8D8C24 84000000 lea ecx,dword ptr ss:[esp+84] 00401425 |. 6A 00 push 0 00401427 |. 51 push ecx 00401428 |. E8 B3F70000 call CrackMe.00410BE0 0040142D |. 83C4 18 add esp,18 00401430 |. 8D5424 74 lea edx,dword ptr ss:[esp+74] 00401434 |. 52 push edx ; /Buffer 00401435 |. 68 FF000000 push 0FF ; |BufSize = FF (255.) 0040143A |. FF15 7C424200 call dword ptr ds:[<&KERNEL32.GetCurrentDirect>; \GetCurrentDirectoryA 00401440 |. B0 61 mov al,61 00401442 |. 8D7C24 74 lea edi,dword ptr ss:[esp+74] 00401446 |. C64424 40 CA mov byte ptr ss:[esp+40],0CA 0040144B |. 884424 46 mov byte ptr ss:[esp+46],al 0040144F |. C64424 43 DD mov byte ptr ss:[esp+43],0DD 00401454 |. C64424 49 00 mov byte ptr ss:[esp+49],0 00401459 |. C64424 47 74 mov byte ptr ss:[esp+47],74 0040145E |. C64424 41 FD mov byte ptr ss:[esp+41],0FD 00401463 |. C64424 44 2E mov byte ptr ss:[esp+44],2E 00401468 |. C64424 45 64 mov byte ptr ss:[esp+45],64 0040146D |. C64424 42 BE mov byte ptr ss:[esp+42],0BE 00401472 |. 884424 48 mov byte ptr ss:[esp+48],al 00401476 |. 83C7 FF add edi,-1 00401479 |. 8DA424 00000000 lea esp,dword ptr ss:[esp] 00401480 |> 8A47 01 /mov al,byte ptr ds:[edi+1] 00401483 |. 83C7 01 |add edi,1 00401486 |. 84C0 |test al,al 00401488 |.^ 75 F6 \jnz short CrackMe.00401480 0040148A |. 66:A1 707A4200 mov ax,word ptr ds:[427A70] 00401490 |. 66:8907 mov word ptr ds:[edi],ax 00401493 |. 8D4424 40 lea eax,dword ptr ss:[esp+40] 00401497 |. 8BD0 mov edx,eax 00401499 |. 8DA424 00000000 lea esp,dword ptr ss:[esp] 004014A0 |> 8A08 /mov cl,byte ptr ds:[eax] 004014A2 |. 83C0 01 |add eax,1 004014A5 |. 84C9 |test cl,cl 004014A7 |.^ 75 F7 \jnz short CrackMe.004014A0 004014A9 |. 8D7C24 74 lea edi,dword ptr ss:[esp+74] 004014AD |. 2BC2 sub eax,edx 004014AF |. 83C7 FF add edi,-1 004014B2 |> 8A4F 01 /mov cl,byte ptr ds:[edi+1] 004014B5 |. 83C7 01 |add edi,1 004014B8 |. 84C9 |test cl,cl 004014BA |.^ 75 F6 \jnz short CrackMe.004014B2 004014BC |. 8BC8 mov ecx,eax 004014BE |. C1E9 02 shr ecx,2 004014C1 |. 8BF2 mov esi,edx 004014C3 |. F3:A5 rep movs dword ptr es:[edi],dword ptr ds:[esi] 004014C5 |. 8BC8 mov ecx,eax 004014C7 |. 83E1 03 and ecx,3 004014CA |. 68 FF000000 push 0FF 004014CF |. F3:A4 rep movs byte ptr es:[edi],byte ptr ds:[esi] 004014D1 |. 8D8C24 78010000 lea ecx,dword ptr ss:[esp+178] 004014D8 |. 6A 00 push 0 004014DA |. 51 push ecx 004014DB |. E8 00F70000 call CrackMe.00410BE0 004014E0 |. 83C4 0C add esp,0C 004014E3 |. 8D9424 74010000 lea edx,dword ptr ss:[esp+174] 004014EA |. 52 push edx ; /Arg1 004014EB |. 8BCB mov ecx,ebx ; | 004014ED |. E8 EE010000 call CrackMe.004016E0 ; \CrackMe.004016E0 004014F2 |. 8D4C24 14 lea ecx,dword ptr ss:[esp+14] 004014F6 |. E8 3E940000 call CrackMe.0040A939 004014FB |. 6A 00 push 0 004014FD |. 6A 00 push 0 004014FF |. 8D4424 7C lea eax,dword ptr ss:[esp+7C] 00401503 |. 50 push eax 00401504 |. 8D4C24 20 lea ecx,dword ptr ss:[esp+20] 00401508 |. C78424 94020000 00>mov dword ptr ss:[esp+294],0 00401513 |. E8 8D980000 call CrackMe.0040ADA5 00401518 |. 85C0 test eax,eax 0040151A |. 8D4C24 14 lea ecx,dword ptr ss:[esp+14] 0040151E |. 0F84 84010000 je CrackMe.004016A8 00401524 |. E8 03930000 call CrackMe.0040A82C 00401529 |. 8BF0 mov esi,eax 0040152B |. 56 push esi 0040152C |. E8 870A0000 call CrackMe.00401FB8 00401531 |. 83C4 04 add esp,4 00401534 |. 8BD8 mov ebx,eax 00401536 |. 56 push esi ; /Arg2 00401537 |. 53 push ebx ; |Arg1 00401538 |. 8D4C24 1C lea ecx,dword ptr ss:[esp+1C] ; | 0040153C |. E8 06910000 call CrackMe.0040A647 ; \CrackMe.0040A647 00401541 |. 8D4C24 14 lea ecx,dword ptr ss:[esp+14] 00401545 |. E8 8D930000 call CrackMe.0040A8D7 0040154A |. 33C9 xor ecx,ecx 0040154C |. 33C0 xor eax,eax 0040154E |. 3BF1 cmp esi,ecx 00401550 |. 7E 0B jle short CrackMe.0040155D 00401552 |> 803403 26 /xor byte ptr ds:[ebx+eax],26 00401556 |. 83C0 01 |add eax,1 00401559 |. 3BC6 |cmp eax,esi 0040155B |.^ 7C F5 \jl short CrackMe.00401552 0040155D |> 894C24 28 mov dword ptr ss:[esp+28],ecx 00401561 |. 894C24 30 mov dword ptr ss:[esp+30],ecx 00401565 |. 894C24 2C mov dword ptr ss:[esp+2C],ecx 00401569 |. 53 push ebx 0040156A |. 8BCE mov ecx,esi 0040156C |. 8D7C24 2C lea edi,dword ptr ss:[esp+2C] 00401570 |. C68424 8C020000 01 mov byte ptr ss:[esp+28C],1 00401578 |. E8 73040000 call CrackMe.004019F0 0040157D |. 85C0 test eax,eax 0040157F |. 75 25 jnz short CrackMe.004015A6 00401581 |. 53 push ebx 00401582 |. E8 360A0000 call CrackMe.00401FBD 00401587 |. 83C4 04 add esp,4 0040158A |. 837C24 28 00 cmp dword ptr ss:[esp+28],0 0040158F |. 0F84 0F010000 je CrackMe.004016A4 00401595 |. 8B4C24 30 mov ecx,dword ptr ss:[esp+30] 00401599 |. 68 00800000 push 8000 0040159E |. 6A 00 push 0 004015A0 |. 51 push ecx 004015A1 |. E9 F8000000 jmp CrackMe.0040169E 004015A6 |> 8D9424 74010000 lea edx,dword ptr ss:[esp+174] 004015AD |. 52 push edx ; /Arg2 004015AE |. 8D4424 2C lea eax,dword ptr ss:[esp+2C] ; | 004015B2 |. 50 push eax ; |Arg1 004015B3 |. E8 F8040000 call CrackMe.00401AB0 ; \CrackMe.00401AB0 004015B8 |. 8B0D 747A4200 mov ecx,dword ptr ds:[427A74] 004015BE |. 8B15 787A4200 mov edx,dword ptr ds:[427A78] 004015C4 |. 8BF8 mov edi,eax 004015C6 |. A1 7C7A4200 mov eax,dword ptr ds:[427A7C] 004015CB |. 894C24 64 mov dword ptr ss:[esp+64],ecx 004015CF |. 8A0D 807A4200 mov cl,byte ptr ds:[427A80] 004015D5 |. 894424 6C mov dword ptr ss:[esp+6C],eax 004015D9 |. 895424 68 mov dword ptr ss:[esp+68],edx 004015DD |. 884C24 70 mov byte ptr ss:[esp+70],cl 004015E1 |. 33C0 xor eax,eax 004015E3 |> 8A5404 64 /mov dl,byte ptr ss:[esp+eax+64] 004015E7 |. 80EA 01 |sub dl,1 004015EA |. 80F2 38 |xor dl,38 004015ED |. 885404 64 |mov byte ptr ss:[esp+eax+64],dl 004015F1 |. 83C0 01 |add eax,1 004015F4 |. 83F8 0B |cmp eax,0B 004015F7 |.^ 7C EA \jl short CrackMe.004015E3 004015F9 |. 33F6 xor esi,esi 004015FB |. EB 03 jmp short CrackMe.00401600 004015FD | 8D49 00 lea ecx,dword ptr ds:[ecx] 00401600 |> 807434 40 38 /xor byte ptr ss:[esp+esi+40],38 00401605 |. 807C34 40 32 |cmp byte ptr ss:[esp+esi+40],32 0040160A |. 76 0E |jbe short CrackMe.0040161A 0040160C |. 8B4C24 24 |mov ecx,dword ptr ss:[esp+24] 00401610 |. 8D4424 40 |lea eax,dword ptr ss:[esp+40] 00401614 |. 50 |push eax ; /Arg1 00401615 |. E8 C6000000 |call CrackMe.004016E0 ; \CrackMe.004016E0 0040161A |> 83C6 01 |add esi,1 0040161D |. 83FE 09 |cmp esi,9 00401620 |.^ 7C DE \jl short CrackMe.00401600 00401622 |. 85FF test edi,edi 00401624 |. 74 5C je short CrackMe.00401682 00401626 |. B1 B9 mov cl,0B9 00401628 |. 884C24 52 mov byte ptr ss:[esp+52],cl 0040162C |. 884C24 58 mov byte ptr ss:[esp+58],cl 00401630 |. 8D4C24 58 lea ecx,dword ptr ss:[esp+58] 00401634 |. B0 B2 mov al,0B2 00401636 |. 51 push ecx 00401637 |. 8D5424 50 lea edx,dword ptr ss:[esp+50] 0040163B |. 52 push edx 0040163C |. C64424 54 D7 mov byte ptr ss:[esp+54],0D7 00401641 |. C64424 55 A2 mov byte ptr ss:[esp+55],0A2 00401646 |. C64424 61 A7 mov byte ptr ss:[esp+61],0A7 0040164B |. C64424 57 E1 mov byte ptr ss:[esp+57],0E1 00401650 |. C64424 5C A3 mov byte ptr ss:[esp+5C],0A3 00401655 |. C64424 5B A6 mov byte ptr ss:[esp+5B],0A6 0040165A |. C64424 62 CF mov byte ptr ss:[esp+62],0CF 0040165F |. C64424 58 B3 mov byte ptr ss:[esp+58],0B3 00401664 |. 884424 56 mov byte ptr ss:[esp+56],al 00401668 |. C64424 59 C9 mov byte ptr ss:[esp+59],0C9 0040166D |. C64424 5D A1 mov byte ptr ss:[esp+5D],0A1 00401672 |. C64424 5E 00 mov byte ptr ss:[esp+5E],0 00401677 |. C64424 64 00 mov byte ptr ss:[esp+64],0 0040167C |. 884424 63 mov byte ptr ss:[esp+63],al 00401680 |. FFD7 call edi 00401682 |> 53 push ebx 00401683 |. E8 35090000 call CrackMe.00401FBD 00401688 |. 83C4 04 add esp,4 0040168B |. 837C24 28 00 cmp dword ptr ss:[esp+28],0 00401690 |. 74 12 je short CrackMe.004016A4 00401692 |. 8B4424 30 mov eax,dword ptr ss:[esp+30] 00401696 |. 68 00800000 push 8000 ; /FreeType = MEM_RELEASE 0040169B |. 6A 00 push 0 ; |Size = 0 0040169D |. 50 push eax ; |Address 0040169E |> FF15 50424200 call dword ptr ds:[<&KERNEL32.VirtualFree>] ; \VirtualFree 004016A4 |> 8D4C24 14 lea ecx,dword ptr ss:[esp+14] 004016A8 |> C78424 88020000 FF>mov dword ptr ss:[esp+288],-1 004016B3 |. E8 7D930000 call CrackMe.0040AA35 004016B8 |. 8B8C24 80020000 mov ecx,dword ptr ss:[esp+280] 004016BF |. 64:890D 00000000 mov dword ptr fs:[0],ecx 004016C6 |. 59 pop ecx 004016C7 |. 5F pop edi 004016C8 |. 5E pop esi 004016C9 |. 5B pop ebx 004016CA |. 8B8C24 68020000 mov ecx,dword ptr ss:[esp+268] 004016D1 |. 33CC xor ecx,esp 004016D3 |. E8 30E40000 call CrackMe.0040FB08 004016D8 |. 8BE5 mov esp,ebp 004016DA |. 5D pop ebp 004016DB \. C3 retn 希望对大家有用 |
|
|
|
[已结束][PEDIY.华章 Crackme 竞赛 2009] [第十二回] –莫拉克
[QUOTE=ccfer;688264]海风今天不来自爆,我来替他爆一次 莫拉克队-CrackMe_crk.rar[/QUOTE] 太牛了 |
|
[违规,结束][PEDIY.华章 Crackme 竞赛 2009] [第十一回] –xm
00401240 /$ 51 push ecx 00401241 |. 53 push ebx 00401242 |. 55 push ebp 00401243 |. 56 push esi 00401244 |. 8B7424 14 mov esi,dword ptr ss:[esp+14] 00401248 |. 8BE9 mov ebp,ecx 0040124A |. 57 push edi 0040124B |. 8BFE mov edi,esi 0040124D |. 83C9 FF or ecx,FFFFFFFF 00401250 |. 33C0 xor eax,eax 00401252 |. 33D2 xor edx,edx 00401254 |. 33DB xor ebx,ebx 00401256 |. 895424 10 mov dword ptr ss:[esp+10],edx 0040125A |. F2:AE repne scas byte ptr es:[edi] 0040125C |. F7D1 not ecx 0040125E |. 49 dec ecx 0040125F |. 75 05 jnz short xm队-Cra.00401266 00401261 |. 8955 60 mov [arg.23],edx 00401264 |. EB 36 jmp short xm队-Cra.0040129C 00401266 |> 8BFE mov edi,esi 00401268 |. 83C9 FF or ecx,FFFFFFFF 0040126B |. 33C0 xor eax,eax 0040126D |. F2:AE repne scas byte ptr es:[edi] 0040126F |. F7D1 not ecx 00401271 |. 49 dec ecx 00401272 |. 74 17 je short xm队-Cra.0040128B 00401274 |> 43 /inc ebx 00401275 |. 8BFE |mov edi,esi 00401277 |. 83C9 FF |or ecx,FFFFFFFF 0040127A |. 33C0 |xor eax,eax 0040127C |. 42 |inc edx 0040127D |. F2:AE |repne scas byte ptr es:[edi] 0040127F |. F7D1 |not ecx 00401281 |. 49 |dec ecx 00401282 |. 3BD1 |cmp edx,ecx 00401284 |.^ 72 EE \jb short xm队-Cra.00401274 00401286 |. 83FB 05 cmp ebx,5 00401289 |. 73 09 jnb short xm队-Cra.00401294 0040128B |> C745 60 00000000 mov [arg.23],0 00401292 |. EB 08 jmp short xm队-Cra.0040129C 00401294 |> C74424 10 01000000 mov dword ptr ss:[esp+10],1 0040129C |> 8B4424 10 mov eax,dword ptr ss:[esp+10] 004012A0 |. 8D4C24 18 lea ecx,dword ptr ss:[esp+18] 004012A4 |. A3 68504000 mov dword ptr ds:[405068],eax 004012A9 |. E8 F01E0000 call <jmp.&MFC42.#800> 004012AE |. 8B4424 10 mov eax,dword ptr ss:[esp+10] 004012B2 |. 5F pop edi 004012B3 |. 5E pop esi 004012B4 |. 5D pop ebp 004012B5 |. 5B pop ebx 004012B6 |. 59 pop ecx 004012B7 \. C2 0400 retn 4 我就现在跟到这里了,不知道对大家有没有帮助 |
|
[违规,结束][PEDIY.华章 Crackme 竞赛 2009] [第十一回] –xm
我也到第一页了,哦哦也! |
|
[已结束][PEDIY.华章 Crackme 竞赛 2009] [第五回] –CL
壳很容易搞定,算法出也很容易找到,只是没办法爆破,呵呵,有壳已经说是违规了,期待管理人员给个说法 |
|
[已结束][PEDIY.华章 Crackme 竞赛 2009] [第四回] –CRC
楼上的,你怎么能这样呢,关键时刻怎能手头没有呢? |
|
|
操作理由
RANk
{{ user_info.golds == '' ? 0 : user_info.golds }}
雪币
{{ experience }}
课程经验
{{ score }}
学习收益
{{study_duration_fmt}}
学习时长
基本信息
荣誉称号:
{{ honorary_title }}
能力排名:
No.{{ rank_num }}
等 级:
LV{{ rank_lv-100 }}
活跃值:
在线值:
浏览人数:{{ visits }}
最近活跃:{{ last_active_time }}
注册时间:{{ user_info.create_date_jsonfmt }}
勋章
兑换勋章
证书
证书查询 >
能力值