|
|
|
|
|
|
|
|
[北京]招聘 安全工程师 + 程序员
我也顶一个 希望有机会~! |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
[原创]RLPack 加壳的 Armadillo find protected 1.8
0012FF6C 00416BC7 /CALL 到 VirtualProtect 来自 ArmaFP.00416BC1 0012FF70 00401000 |Address = ArmaFP.<模块入口点> 0012FF74 00005000 |Size = 5000 (20480.) 0012FF78 00000020 |NewProtect = PAGE_EXECUTE_READ 0012FF7C 0041AC12 \pOldProtect = ArmaFP.0041AC12 0012FF80 00400000 ArmaFP.00400000 0012FF84 003E0031 00416BC7 83C6 0C ADD ESI,0C 00416BCA 833E FF CMP DWORD PTR DS:[ESI],-1 00416BCD 75 01 JNZ SHORT ArmaFP.00416BD0 /////// 00416BCF 47 INC EDI 00416BD0 0BFF OR EDI,EDI 00416BD2 ^ 74 CD JE SHORT ArmaFP.00416BA1 00416BD4 61 POPAD 00416BD5 C3 RETN 00416BD6 C3 RETN 00415FAE E8 850A0000 CALL ArmaFP.00416A38 00415FB3 83BD 0C4E0000 0>CMP DWORD PTR SS:[EBP+4E0C],0 00415FBA 74 07 JE SHORT ArmaFP.00415FC3 00415FBC E9 10100000 JMP ArmaFP.00416FD1 00415FC1 EB 01 JMP SHORT ArmaFP.00415FC4 00415FC3 61 POPAD 00415FC4 - E9 13D5FEFF JMP ArmaFP.004034DC 00415FC9 90 NOP 004034D4 C9 LEAVE 004034D5 C3 RETN 004034D6 - FF25 78614000 JMP DWORD PTR DS:[406178] ; comdlg32.GetOpenFileNameA 004034DC 55 PUSH EBP //////////// 004034DD 8BEC MOV EBP,ESP 004034DF 6A FF PUSH -1 004034E1 68 48904000 PUSH ArmaFP.00409048 004034E6 68 10404000 PUSH ArmaFP.00404010 004034EB 64:A1 00000000 MOV EAX,DWORD PTR FS:[0] 004034F1 50 PUSH EAX 004034F2 64:8925 0000000>MOV DWORD PTR FS:[0],ESP 004034F9 83EC 58 SUB ESP,58 004034FC 53 PUSH EBX 004034FD 56 PUSH ESI 004034FE 57 PUSH EDI 004034FF 8965 E8 MOV DWORD PTR SS:[EBP-18],ESP 00403502 FF15 10614000 CALL DWORD PTR DS:[406110] ; kernel32.GetVersion 00403508 33D2 XOR EDX,EDX 0040350A 8AD4 MOV DL,AH 0040350C 8915 A8CF4000 MOV DWORD PTR DS:[40CFA8],EDX |
|
|
|
|
|
[分享]海狼三人组CrackMe分析过程
好长的文章啊 分析的不错 学习再学习 顺便问下楼主那所学校攻读啊 |
|
|
|
|
|
[原创]中国地区入门破解实力排名测试
00407EC6 . FF91 0C070000 call dword ptr ds:[ecx+70C] 00407ECC . 8B4D E8 mov ecx,dword ptr ss:[ebp-18] 00407ECF . 8B55 DC mov edx,dword ptr ss:[ebp-24] 00407ED2 . 51 push ecx 00407ED3 . 52 push edx 00407ED4 . FF15 70104000 call dword ptr ds:[<&MSVBVM60.__vbaStrCm>; MSVBVM60.__vbaStrCmp 00407EDA . 8BF8 mov edi,eax 00407EDC . 8D45 DC lea eax,dword ptr ss:[ebp-24] 00407EDF . F7DF neg edi 00407EE1 . 8D4D E8 lea ecx,dword ptr ss:[ebp-18] 00407EE4 . 50 push eax 00407EE5 . 1BFF sbb edi,edi 00407EE7 . 8D55 E0 lea edx,dword ptr ss:[ebp-20] 00407EEA . 51 push ecx 00407EEB . 47 inc edi 00407EEC . 52 push edx 0012E4A8 0016561C UNICODE "092502A2" 0012E4AC 0016581C UNICODE "111111111111111111"
|
|
|
[讨论]什么时候发看雪论坛精华10
期待精华10...... |
|
|
|
|
|
[下载]WinDbg 6.10.3汉化版
多谢 支持ch |
|
|
|
操作理由
RANk
{{ user_info.golds == '' ? 0 : user_info.golds }}
雪币
{{ experience }}
课程经验
{{ score }}
学习收益
{{study_duration_fmt}}
学习时长
基本信息
荣誉称号:
{{ honorary_title }}
勋章
兑换勋章
证书
证书查询 >
能力值