-
-
[旧帖] [求助]我太笨了,怎么分析mbr啊? 0.00雪花
-
发表于: 2012-7-7 14:30 1132
-
1winhex->工具->打开磁盘->物理磁盘:
在offset00处选块开始,在offser1f0处选块结束;编辑->复制选块->16位值。
保存到文本文件。
用ida查看,在提示是用32位或16位的时候,选择no.
结果反汇编的结果是
seg000:0000 seg000 segment byte public 'CODE' use16
seg000:0000 assume cs:seg000
seg000:0000 assume es:nothing, ss:nothing, ds:nothing, fs:nothing, gs:nothing
seg000:0000 xor si, [bp+di]
seg000:0002 inc bx
seg000:0003 xor [bx+si], bh
seg000:0005 inc bp
seg000:0006 inc sp
seg000:0007 xor [bp+si+43h], al
seg000:000A xor [bx+si], dh
winhex选块值是
33C08ED0BC007CFB5007501FFCBE1B7CBF1B065057B9E501F3A4CBBDBE07B104386E007C09751383C510E2F4CD188BF583C610497419382C74F6A0B507B4078BF0AC3C0074FCBB0700B40ECD10EBF2884E10E84600732AFE4610807E040B740B807E040C7405A0B60775D2804602068346080683560A00E821007305A0B607EBBC813EFE7D55AA740B807E100074C8A0B707EBA98BFC1E578BF5CBBF05008A5600B408CD1372238AC1243F988ADE8AFC43F7E38BD186D6B106D2EE42F7E239560A77237205394608731CB80102BB007C8B4E028B5600CD1373514F744E32E48A5600CD13EBE48A560060BBAA55B441CD13723681FB55AA7530F6C101742B61606A006A00FF760AFF76086A0068007C6A016A10B4428BF4CD136161730E4F740B32E48A5600CD13EBD661F9C3496E76616C696420706172746974696F6E207461626C65004572726F72206C6F6164696E67206F7065726174696E672073797374656D004D697373696E67206F7065726174696E672073797374656D000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002C4463E0A24A620000800101000CFEFFFF3F000000FC8A38010000C1FF0FFEFFFF3B8B380186591808000000000000000000000000000000000000000000000000000000000000000055AA
在offset00处选块开始,在offser1f0处选块结束;编辑->复制选块->16位值。
保存到文本文件。
用ida查看,在提示是用32位或16位的时候,选择no.
结果反汇编的结果是
seg000:0000 seg000 segment byte public 'CODE' use16
seg000:0000 assume cs:seg000
seg000:0000 assume es:nothing, ss:nothing, ds:nothing, fs:nothing, gs:nothing
seg000:0000 xor si, [bp+di]
seg000:0002 inc bx
seg000:0003 xor [bx+si], bh
seg000:0005 inc bp
seg000:0006 inc sp
seg000:0007 xor [bp+si+43h], al
seg000:000A xor [bx+si], dh
winhex选块值是
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
[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)
赞赏
他的文章
看原图
赞赏
雪币:
留言: