-
-
[旧帖] [求助]peid kanal 结果分析 0.00雪花
-
发表于: 2012-11-12 14:10 1315
-
peid kanakl分析的一个程序所用的加密解密算法,怎么分析呢,后面的::0025FDE0表示什么意思?
BASE64 table :: 0025FDE0 :: 00660BE0 BASE64 table :: 0026C290 :: 0066D090 BASE64 table :: 0027DF20 :: 0067EF20 CryptGenRandom [Name] :: 0026C03C :: 0066CE3C ECC: B-163 (NIST), hash output :: 00253B4A :: 0065494A ECC: B-233 (NIST), hash input :: 00253DF8 :: 00654BF8 ECC: B-283 (NIST), hash input :: 00254080 :: 00654E80 ECC: B-409 (NIST), hash input :: 002542C8 :: 006550C8 ECC: B-571 (NIST), hash input :: 002545E8 :: 006553E8 ECC: c2pnb163v1 (X 9.62), "a" coef :: 002547E9 :: 006555E9 ECC: c2pnb163v2 (X 9.62), "a" coef :: 00254891 :: 00655691 ECC: c2pnb163v3 (X 9.62), "a" coef :: 00254939 :: 00655739 ECC: c2pnb208w1 (X 9.62), "b" coef :: 00254CB5 :: 00655AB5 ECC: c2pnb272w1 (X 9.62), "a" coef :: 00254FE4 :: 00655DE4 ECC: c2pnb368w1 (X 9.62), "a" coef :: 00255310 :: 00656110 ECC: c2tnb191v1 (X 9.62), "a" coef :: 00254A84 :: 00655884 ECC: c2tnb191v2 (X 9.62), "a" coef :: 00254B3C :: 0065593C ECC: c2tnb191v3 (X 9.62), "a" coef :: 00254BF4 :: 006559F4 ECC: c2tnb239v1 (X 9.62), "a" coef :: 00254D6A :: 00655B6A ECC: c2tnb239v2 (X 9.62), "a" coef :: 00254E42 :: 00655C42 ECC: c2tnb239v3 (X 9.62), "a" coef :: 00254F1A :: 00655D1A ECC: c2tnb359v1 (X 9.62), "a" coef :: 002551E9 :: 00655FE9 ECC: c2tnb431r1 (X 9.62), "a" coef :: 00255446 :: 00656246 ECC: K-163 (NIST), base point x-coord :: 00253A3F :: 0065483F ECC: K-233 (NIST), base point x-coord :: 00253D8A :: 00654B8A ECC: K-283 (NIST), base point x-coord :: 00254004 :: 00654E04 ECC: K-409 (NIST), base point x-coord :: 0025421C :: 0065501C ECC: K-571 (NIST), base point x-coord :: 00254500 :: 00655300 ECC: P-192 (NIST), hash input :: 002526B8 :: 006534B8 ECC: P-192 v2 (X 9.62), hash input :: 00252B38 :: 00653938 ECC: P-192 v3 (X 9.62), hash input :: 00252BF0 :: 006539F0 ECC: P-224 (NIST), hash input :: 00252770 :: 00653570 ECC: P-239 v1 (X 9.62), hash input :: 00252CA8 :: 00653AA8 ECC: P-239 v2 (X 9.62), hash input :: 00252D80 :: 00653B80 ECC: P-239 v3 (X 9.62), hash input :: 00252E58 :: 00653C58 ECC: P-256 (NIST), hash input :: 00252F30 :: 00653D30 ECC: P-384 (NIST), hash input :: 00252840 :: 00653640 ECC: P-521 (NIST), hash input :: 00252988 :: 00653788 ECC: secp112r1 (SEC2), prime modulus :: 0025302C :: 00653E2C ECC: secp112r1 (SEC2), prime modulus :: 002530A4 :: 00653EA4 ECC: secp112r2 (SEC2), "a" coef :: 002530B2 :: 00653EB2 ECC: secp128r1 (SEC2), "b" coef :: 0025313C :: 00653F3C ECC: secp128r2 (SEC2), "a" coef :: 002531B4 :: 00653FB4 ECC: secp160k1 (SEC2), base point x-coord :: 00253258 :: 00654058 ECC: secp160r1 (SEC2), "b" coef :: 002532E7 :: 006540E7 ECC: secp160r2 (SEC2), "b" coef :: 0025338F :: 0065418F ECC: secp192k1 (SEC2), base point x-coord :: 00253440 :: 00654240 ECC: secp224k1 (SEC2), base point x-coord :: 002534F0 :: 006542F0 ECC: secp256k1 (SEC2), base point x-coord :: 002535B8 :: 006543B8 ECC: sect113r1 (SEC2), "a" coef :: 00253804 :: 00654604 ECC: sect113r2 (SEC2), "a" coef :: 00253884 :: 00654684 ECC: sect131r1 (SEC2), "a" coef :: 00253905 :: 00654705 ECC: sect131r2 (SEC2), "a" coef :: 00253995 :: 00654795 ECC: sect163r1 (SEC2), "a" coef :: 00253AA5 :: 006548A5 ECC: sect193r1 (SEC2), "a" coef :: 00253BDE :: 006549DE ECC: sect193r2 (SEC2), "a" coef :: 00253C9D :: 00654A9D ECC: sect239k1 (SEC2), base point x-coord :: 00253F2A :: 00654D2A FORK-256 [mixing] :: 001D6FB7 :: 005D7BB7 List of primes [word] :: 002572CA :: 006580CA MD5 :: 001C1E19 :: 005C2A19 RIJNDAEL [S-inv] [char] :: 002424F8 :: 006432F8 SHA1 [Compress] :: 001B5394 :: 005B5F94 SHA-224 [Init] :: 001D6E34 :: 005D7A34 SHA-256 [mixing] :: 00256688 :: 00657488 SHA-384 [Init] :: 001D8388 :: 005D8F88 SHA-512 [init] :: 001D8428 :: 005D9028
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课
赞赏
他的文章
- [求助]数字签名可以伪造吗? 2338
- [求助]有没有了解Fairplay加密机制? 1094
- [求助]密文怎么不是字符串 1193
- [求助]peid kanal 结果分析 1316
- [求助]DRM解密 1338
看原图
赞赏
雪币:
留言: