能力值:
( LV2,RANK:10 )
|
-
-
2 楼
6287-A
|
能力值:
( LV2,RANK:10 )
|
-
-
3 楼
楼上完解!
|
能力值:
( LV2,RANK:10 )
|
-
-
4 楼
用户名要大于四位
然后用注册码
6287-A
|
能力值:
( LV13,RANK:760 )
|
-
-
5 楼
。。。不知道你要表达些什么东东
|
能力值:
( LV2,RANK:10 )
|
-
-
6 楼
写个过程,没表达什么思想
|
能力值:
( LV2,RANK:10 )
|
-
-
7 楼
用户名和密码都不能小于或等于五
|
能力值:
( LV2,RANK:10 )
|
-
-
8 楼
004014C9 55 push ebp 在此F2断点
004014CA 56 push esi
004014CB 8BF1 mov esi,ecx
004014CD 57 push edi
004014CE 8DBE A0000000 lea edi,dword ptr ds:[esi+A0]
004014D4 8BCF mov ecx,edi
004014D6 E8 6F030000 call <jmp.&MFC42.#3876>
004014DB 8B1D FC214000 mov ebx,dword ptr ds:[<&USER32.PostQuitM>; USER32.PostQuitMessage
004014E1 83F8 05 cmp eax,5
004014E4 7E 50 jle short CrackMe.00401536
004014E6 8D6E 60 lea ebp,dword ptr ds:[esi+60]
004014E9 8BCD mov ecx,ebp
004014EB E8 5A030000 call <jmp.&MFC42.#3876>
004014F0 83F8 05 cmp eax,5
004014F3 7E 41 jle short CrackMe.00401536
004014F5 8D86 E0000000 lea eax,dword ptr ds:[esi+E0]
004014FB 8BCF mov ecx,edi
004014FD 50 push eax
004014FE E8 41030000 call <jmp.&MFC42.#3874>
00401503 8DBE E4000000 lea edi,dword ptr ds:[esi+E4]
00401509 8BCD mov ecx,ebp
0040150B 57 push edi
0040150C E8 33030000 call <jmp.&MFC42.#3874>
00401511 8B07 mov eax,dword ptr ds:[edi]
00401513 8038 36 cmp byte ptr ds:[eax],36 // 这里开始验证你的注册码 6
00401516 75 1E jnz short CrackMe.00401536
00401518 8078 01 32 cmp byte ptr ds:[eax+1],32 //32转换为字符是 2
0040151C 75 18 jnz short CrackMe.00401536
0040151E 8078 02 38 cmp byte ptr ds:[eax+2],38 //这里是 8
00401522 75 12 jnz short CrackMe.00401536
00401524 8078 03 37 cmp byte ptr ds:[eax+3],37 //37转换为字符是 7
00401528 75 0C jnz short CrackMe.00401536
0040152A 8078 04 2D cmp byte ptr ds:[eax+4],2D //2D转换为字符是-
0040152E 75 06 jnz short CrackMe.00401536
00401530 8078 05 41 cmp byte ptr ds:[eax+5],41 //41转化为字符是A
00401534 74 17 je short CrackMe.0040154D
00401536 6A 00 push 0
00401538 68 64304000 push CrackMe.00403064 ; 出错!
0040153D 68 38304000 push CrackMe.00403038 ; 输入出错,请重新试一遍!
00401542 8BCE mov ecx,esi
00401544 E8 F5020000 call <jmp.&MFC42.#4224>
00401549 6A 00 push 0
0040154B FFD3 call ebx
0040154D 8D8E E0000000 lea ecx,dword ptr ds:[esi+E0]
00401553 8D5424 14 lea edx,dword ptr ss:[esp+14]
00401557 51 push ecx
00401558 68 2C304000 push CrackMe.0040302C ; 你真棒呀!
0040155D 52 push edx
这个CRACK很简单,任何一个大于5的用户名都可以用这个注册码
|
|
|