能力值:
( LV2,RANK:10 )
|
-
-
2 楼
现在多没时间了
|
能力值:
( LV9,RANK:160 )
|
-
-
3 楼
不好意思上面的CrackMe写时比较函数的返回值设置时出现了问题!!!!!!!
现重传过一个CrackMe!!!!!
这个CrackMe我自己测试过了~~~~~~~~~
|
能力值:
( LV13,RANK:260 )
|
-
-
4 楼
co]8j9
123456
取模 realease版本...
|
能力值:
( LV3,RANK:20 )
|
-
-
5 楼
0040117A |> /0FBE4C14 24 /movsx ecx,byte ptr ss:[esp+edx+0x24]
0040117F |. |83E9 30 |sub ecx,0x30
00401182 |. |8AC3 |mov al,bl
00401184 |. |02C1 |add al,cl
00401186 |. |F6E9 |imul cl
00401188 |. |024424 0C |add al,byte ptr ss:[esp+0xC]
0040118C |. |884414 10 |mov byte ptr ss:[esp+edx+0x10],al
00401190 |. |79 06 |jns short Release.00401198
00401192 |. |F6D8 |neg al
00401194 |. |884414 10 |mov byte ptr ss:[esp+edx+0x10],al
00401198 |> |8A4414 10 |mov al,byte ptr ss:[esp+edx+0x10]
0040119C |. |3C 38 |cmp al,0x38
0040119E |. |7D 04 |jge short Release.004011A4
004011A0 |. |04 35 |add al,0x35
004011A2 |. |EB 15 |jmp short Release.004011B9
004011A4 |> |3C 5E |cmp al,0x5E
004011A6 |. |7C 15 |jl short Release.004011BD
004011A8 |. |0FBEC8 |movsx ecx,al
004011AB |. |81F9 A6000000 |cmp ecx,0xA6
004011B1 |. |75 04 |jnz short Release.004011B7
004011B3 |. |2C 45 |sub al,0x45
004011B5 |. |EB 02 |jmp short Release.004011B9
004011B7 |> |2C 25 |sub al,0x25
004011B9 |> |884414 10 |mov byte ptr ss:[esp+edx+0x10],al
004011BD |> |42 |inc edx
004011BE |. |3BD6 |cmp edx,esi
004011C0 |.^\7C B8 \jl short Release.0040117A
CO]8J9OOZ
123456789
|
能力值:
( LV9,RANK:160 )
|
-
-
6 楼
你分析的代码还有最重要的部份没有贴出来~
你可以写出算法注册机机不
|
能力值:
( LV2,RANK:10 )
|
-
-
7 楼
注册机 通过key算username
|
能力值:
( LV2,RANK:10 )
|
-
-
8 楼
可以由key算username...,还有不正常的可能,溢出了
|
能力值:
( LV2,RANK:10 )
|
-
-
9 楼
username:[alt+17]是^Q alt+17 alt+64中间没有空格
!这是我写的第一个CH;是没有经过防爆破的。呵呵爆破是很间单的希望能给出alt+17 alt+64
key:
任意
username:
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA出alt+17 alt+64
key
任意
一组正常的:
999
000
|
|
|