00458C6C /. 55 PUSH EBP
00458C6D |. 8BEC MOV EBP,ESP
00458C6F |. 6A 00 PUSH 0
00458C71 |. 53 PUSH EBX
00458C72 |. 8BD8 MOV EBX,EAX
00458C74 |. 33C0 XOR EAX,EAX
00458C76 |. 55 PUSH EBP
00458C77 |. 68 BF8C4500 PUSH CrackMe1.00458CBF
00458C7C |. 64:FF30 PUSH DWORD PTR FS:[EAX]
00458C7F |. 64:8920 MOV DWORD PTR FS:[EAX],ESP
00458C82 |. 8D55 FC LEA EDX,DWORD PTR SS:[EBP-4]
00458C85 |. 8B83 F4020000 MOV EAX,DWORD PTR DS:[EBX+2F4]
00458C8B |. E8 8CF0FDFF CALL CrackMe1.00437D1C
00458C90 |. 8B45 FC MOV EAX,DWORD PTR SS:[EBP-4]
00458C93 |. BA D48C4500 MOV EDX,CrackMe1.00458CD4 ; ASCII "aa"
00458C98 |. E8 13BAFAFF CALL CrackMe1.004046B0
00458C9D |. 75 0A JNZ SHORT CrackMe1.00458CA9
00458C9F |. B8 E08C4500 MOV EAX,CrackMe1.00458CE0 ; ASCII "ok"
00458CA4 |. E8 538EFDFF CALL CrackMe1.00431AFC
00458CA9 |> 33C0 XOR EAX,EAX
00458CAB |. 5A POP EDX
00458CAC |. 59 POP ECX
00458CAD |. 59 POP ECX
00458CAE |. 64:8910 MOV DWORD PTR FS:[EAX],EDX
00458CB1 |. 68 C68C4500 PUSH CrackMe1.00458CC6
00458CB6 |> 8D45 FC LEA EAX,DWORD PTR SS:[EBP-4]
00458CB9 |. E8 F6B5FAFF CALL CrackMe1.004042B4
00458CBE \. C3 RETN
00458CBF .^E9 18B0FAFF JMP CrackMe1.00403CDC
00458CC4 .^EB F0 JMP SHORT CrackMe1.00458CB6
00458CC6 . 5B POP EBX ; 00CD37F0
00458CC7 . 59 POP ECX
00458CC8 . 5D POP EBP
00458CC9 . C3 RETN
能不能解释下意思。这是我自己写的跳转程序
00458C6C /. 55 PUSH EBP
00458C6D |. 8BEC MOV EBP,ESP
00458C6F |. 6A 00 PUSH 0
00458C71 |. 53 PUSH EBX
00458C72 |. 8BD8 MOV EBX,EAX
00458C74 |. 33C0 XOR EAX,EAX
00458C76 |. 55 PUSH EBP
00458C77 |. 68 BF8C4500 PUSH CrackMe1.00458CBF
00458C7C |. 64:FF30 PUSH DWORD PTR FS:[EAX]
这写push干什么用的。我用ollydbg怎么看到push的栈里的数据?
很简单的程序,给菜鸟说说吧
[注意]传递专业知识、拓宽行业人脉——看雪讲师团队等你加入!