能力值:
(RANK:300 )
|
-
-
2 楼
如果是给新手的 crackme ,可以把连结发到置顶的新手 crackme 博物馆里
|
能力值:
( LV9,RANK:530 )
|
-
-
3 楼
00402FE0 55 PUSH EBP
00402FE1 |. 8BEC MOV EBP,ESP
00402FE3 |. 51 PUSH ECX
00402FE4 |. E8 E7000000 CALL CrackMe-.004030D0
00402FE9 |. 833D 0C044300 >CMP DWORD PTR DS:[43040C],1
00402FF0 |. 75 11 JNZ SHORT CrackMe-.00403003
00402FF2 |. 8B45 08 MOV EAX,DWORD PTR SS:[EBP+8]
00402FF5 |. 50 PUSH EAX ; /ExitCode
00402FF6 |. FF15 08234300 CALL DWORD PTR DS:[<&KERNEL32.GetCurrent>; |[GetCurrentProcess
00402FFC |. 50 PUSH EAX ; |hProcess
00402FFD |. FF15 9C234300 CALL DWORD PTR DS:[<&KERNEL32.TerminateP>; \TerminateProcess
00403003 |> C705 08044300 >MOV DWORD PTR DS:[430408],1
0040300D |. 8A4D 10 MOV CL,BYTE PTR SS:[EBP+10]
00403010 |. 880D 04044300 MOV BYTE PTR DS:[430404],CL
00403016 |. 837D 0C 00 CMP DWORD PTR SS:[EBP+C],0
0040301A |. 75 47 JNZ SHORT CrackMe-.00403063
0040301C |. 833D D81E4300 >CMP DWORD PTR DS:[431ED8],0
00403023 |. 74 2C JE SHORT CrackMe-.00403051
00403025 |. 8B15 D41E4300 MOV EDX,DWORD PTR DS:[431ED4]
0040302B |. 8955 FC MOV DWORD PTR SS:[EBP-4],EDX
0040302E |> 8B45 FC /MOV EAX,DWORD PTR SS:[EBP-4]
00403031 |. 83E8 04 |SUB EAX,4
00403034 |. 8945 FC |MOV DWORD PTR SS:[EBP-4],EAX
00403037 |. 8B4D FC |MOV ECX,DWORD PTR SS:[EBP-4]
0040303A |. 3B0D D81E4300 |CMP ECX,DWORD PTR DS:[431ED8]
00403040 |. 72 0F |JB SHORT CrackMe-.00403051
00403042 |. 8B55 FC |MOV EDX,DWORD PTR SS:[EBP-4]
00403045 |. 833A 00 |CMP DWORD PTR DS:[EDX],0
00403048 |. 74 05 |JE SHORT CrackMe-.0040304F
0040304A |. 8B45 FC |MOV EAX,DWORD PTR SS:[EBP-4]
0040304D |. FF10 |CALL DWORD PTR DS:[EAX]
0040304F |>^EB DD \JMP SHORT CrackMe-.0040302E
00403051 |> 68 24C74200 PUSH CrackMe-.0042C724 ; /Arg2 = 0042C724
00403056 |. 68 1CC54200 PUSH CrackMe-.0042C51C ; |Arg1 = 0042C51C
0040305B |. E8 90000000 CALL CrackMe-.004030F0 ; \CrackMe-.004030F0
00403060 |. 83C4 08 ADD ESP,8
00403063 |> 68 2CC94200 PUSH CrackMe-.0042C92C ; /Arg2 = 0042C92C
00403068 |. 68 28C84200 PUSH CrackMe-.0042C828 ; |Arg1 = 0042C828
0040306D |. E8 7E000000 CALL CrackMe-.004030F0 ; \CrackMe-.004030F0
00403072 |. 83C4 08 ADD ESP,8
00403075 |. 833D 10044300 >CMP DWORD PTR DS:[430410],0
0040307C |. 75 20 JNZ SHORT CrackMe-.0040309E
0040307E |. 6A FF PUSH -1 ; /Arg1 = FFFFFFFF
00403080 |. E8 BB390000 CALL CrackMe-.00406A40 ; \CrackMe-.00406A40
00403085 |. 83C4 04 ADD ESP,4
00403088 |. 83E0 20 AND EAX,20
0040308B |. 85C0 TEST EAX,EAX
0040308D |. 74 0F JE SHORT CrackMe-.0040309E
0040308F |. C705 10044300 >MOV DWORD PTR DS:[430410],1
00403099 |. E8 B2420000 CALL CrackMe-.00407350
0040309E |> 837D 10 00 CMP DWORD PTR SS:[EBP+10],0
004030A2 74 07 JE SHORT CrackMe-.004030AB
004030A4 |. E8 37000000 CALL CrackMe-.004030E0
004030A9 |. EB 14 JMP SHORT CrackMe-.004030BF
004030AB |> C705 0C044300 >MOV DWORD PTR DS:[43040C],1
004030B5 |. 8B4D 08 MOV ECX,DWORD PTR SS:[EBP+8]
004030B8 |. 51 PUSH ECX ; /ExitCode
004030B9 |. FF15 78234300 CALL DWORD PTR DS:[<&KERNEL32.ExitProces>; \ExitProcess
004030BF |> 8BE5 MOV ESP,EBP
004030C1 |. 5D POP EBP
004030C2 \. C3 RETN
还有反调试代码呢,
想吓人啊。
|
能力值:
( LV9,RANK:210 )
|
-
-
4 楼
用OD的进程附加
004019BF JNZ SHORT CrackMe-.00401A25 //爆破点
|
能力值:
( LV9,RANK:770 )
|
-
-
5 楼
恭喜
|
能力值:
(RANK:300 )
|
-
-
6 楼
|
能力值:
( LV9,RANK:770 )
|
-
-
7 楼
|
能力值:
( LV4,RANK:50 )
|
-
-
8 楼
最初由 Winter-Night 发布 用OD的进程附加 004019BF JNZ SHORT CrackMe-.00401A25 //爆破点
能否将过程具体写出来给俺等菜鸟学习一下?谢谢!
|
能力值:
(RANK:300 )
|
-
-
9 楼
最初由 kyc 发布
I honor you
你 honor 谁 ?
( 你把 honor 给那一位成功破解的人 ? )
|
能力值:
( LV2,RANK:10 )
|
-
-
10 楼
我真的好受伤,吼吼
|
能力值:
( LV2,RANK:10 )
|
-
-
11 楼
果然简单,给新手用不错
|
能力值:
( LV9,RANK:210 )
|
-
-
12 楼
这个不是很难,教程就不必了,自己跟一下,很明显的
|