0048CA5E |. E8 9DFFFFFF call <jmp.&wsock32.WSAStartup> ; \WSAStartup
0048CA63 |. 8BC5 mov eax, ebp
0048CA65 |. E8 827BF7FF call 004045EC
0048CA6A |. 6A 40 push 40 ; /BufSize = 40 (64.)
0048CA6C |. 8D4424 04 lea eax, dword ptr [esp+4] ; |
0048CA70 |. 50 push eax ; |Buffer
0048CA71 |. E8 82FFFFFF call <jmp.&wsock32.gethostname> ; \gethostname
0048CA76 |. 54 push esp ; /Name
0048CA77 |. E8 74FFFFFF call <jmp.&wsock32.gethostbyname> ; \gethostbyname
0048CA7C |. 85C0 test eax, eax
0048CA7E 74 22 je short 0048CAA2
0048CA80 |. 8B70 0C mov esi, dword ptr [eax+C]
0048CA83 |. 33DB xor ebx, ebx
0048CA85 |. EB 0F jmp short 0048CA96
0048CA87 |> FF37 /push dword ptr [edi]
0048CA89 |. E8 5AFFFFFF |call <jmp.&wsock32.inet_ntoa>
0048CA8E |. 8BD5 |mov edx, ebp
0048CA90 |. E8 5FC9F7FF |call 004093F4
0048CA95 |. 43 |inc ebx
0048CA96 |> 8B3C9E mov edi, dword ptr [esi+ebx*4]
0048CA99 |. 85FF |test edi, edi
0048CA9B ^ 75 EA jnz short 0048CA87
0048CA9D |. E8 66FFFFFF call <jmp.&wsock32.WSACleanup> ; [WSACleanup
0048CAA2 |> \81C4 D0010000 add esp, 1D0
0048CAA8 |. 5D pop ebp
0048CAA9 |. 5F pop edi
0048CAAA |. 5E pop esi
0048CAAB |. 5B pop ebx
0048CAAC \. C3 retn
004045EC /$ 8B10 mov edx, dword ptr [eax]
004045EE |. 85D2 test edx, edx
004045F0 |. 74 1C je short 0040460E
004045F2 |. C700 00000000 mov dword ptr [eax], 0
004045F8 |. 8B4A F8 mov ecx, dword ptr [edx-8]
004045FB |. 49 dec ecx
004045FC |. 7C 10 jl short 0040460E
004045FE |. F0:FF4A F8 lock dec dword ptr [edx-8]
00404602 |. 75 0A jnz short 0040460E
00404604 |. 50 push eax
00404605 |. 8D42 F8 lea eax, dword ptr [edx-8]
00404608 |. E8 A3E4FFFF call 00402AB0
0040460D |. 58 pop eax
0040460E \> C3 retn
00402AB0 /$ 53 push ebx
00402AB1 |. 85C0 test eax, eax
00402AB3 |. 74 15 je short 00402ACA
00402AB5 |. FF15 44D04A00 call dword ptr [4AD044] ; w122110.004025D8
00402ABB |. 8BD8 mov ebx, eax
00402ABD |. 85DB test ebx, ebx
00402ABF |. 74 0B je short 00402ACC
00402AC1 |. B0 02 mov al, 2
00402AC3 |. E8 38010000 call 00402C00
00402AC8 |. EB 02 jmp short 00402ACC
00402ACA |> 33DB xor ebx, ebx
00402ACC |> 8BC3 mov eax, ebx
00402ACE |. 5B pop ebx
00402ACF \. C3 retn
这段代码是网络验证部分,怎么样才能跳过网络验证?请朋友们帮下
[课程]Android-CTF解题方法汇总!