大家好,我初?破解,第一次提?,?多指教.
我想用爆破的方法破解一共享?件,用W32DASM打檫後找到提示邋锗信息的位置,代瘁如下:??我??何?下手?
(?件提供英文和中文界面,所以有?肺遮言的?息)
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:005A3371(C)
|
:005A336C 6A00 push 00000000
:005A336E 6A00 push 00000000
:005A3370 49 dec ecx
:005A3371 75F9 jne 005A336C
:005A3373 51 push ecx
:005A3374 53 push ebx
:005A3375 8BD8 mov ebx, eax
:005A3377 33C0 xor eax, eax
:005A3379 55 push ebp
:005A337A 6838365A00 push 005A3638
:005A337F 64FF30 push dword ptr fs:[eax]
:005A3382 648920 mov dword ptr fs:[eax], esp
:005A3385 A174D47000 mov eax, dword ptr [0070D474]
:005A338A 803800 cmp byte ptr [eax], 00
:005A338D 751C jne 005A33AB
:005A338F 8D45FC lea eax, dword ptr [ebp-04]
* Possible StringData Ref from Code Obj ->"Registration success."
|
:005A3392 BA4C365A00 mov edx, 005A364C
:005A3397 E8D00DE6FF call 0040416C
:005A339C 8D45F8 lea eax, dword ptr [ebp-08]
* Possible StringData Ref from Code Obj ->"Password not correct!"
|
:005A339F BA6C365A00 mov edx, 005A366C
:005A33A4 E8C30DE6FF call 0040416C
:005A33A9 EB1A jmp 005A33C5
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:005A338D(C)
|
:005A33AB 8D45FC lea eax, dword ptr [ebp-04]
* Possible StringData Ref from Code Obj ->"已成功登?"
|
:005A33AE BA8C365A00 mov edx, 005A368C
:005A33B3 E8B40DE6FF call 0040416C
:005A33B8 8D45F8 lea eax, dword ptr [ebp-08]
* Possible StringData Ref from Code Obj ->"密瘁不正催"
|
:005A33BB BAA0365A00 mov edx, 005A36A0
:005A33C0 E8A70DE6FF call 0040416C
[培训]《安卓高级研修班(网课)》月薪三万计划,掌握调试、分析还原ollvm、vmp的方法,定制art虚拟机自动化脱壳的方法