论坛重开,发个CrackMe给大家练练手【[PYG]CrackMe#1】
【CrackMe#1】难度:中等
要求:分析详细算法,写出注册机
最低也要找到详细爆破地址~~ 哇哈哈~~沙发哇~~~ 试试!~~~~~~ 这个我还不会!
等等先 来了,就有好东西练手 先收藏,等水平够了再试 下来玩一下,看会不会```哈```算法没入门呢 好像做好多手脚似的?```哈```
功力不够```看来是没希望了,以后再玩吧,晚上还要上课呢 0041A06C .FF15 B810>CALL DWORD PTR DS:[<&MSVBVM60.__vbaStrCmp>] ;MSVBVM60.__vbaStrCmp
0041A072 .85C0 TEST EAX,EAX
0041A074 .74 0F JE SHORT unpacked.0041A085 <---- NOP
0041A076 .BA 902241>MOV EDX,unpacked.00412290
0041A07B .8BCF MOV ECX,EDI
0041A07D .FF15 7411>CALL DWORD PTR DS:[<&MSVBVM60.__vbaStrCopy>] ;MSVBVM60.__vbaStrCopy
0041D9C3 .FF15 2410>CALL DWORD PTR DS:[<&MSVBVM60.__vbaLenBstr>] ;MSVBVM60.__vbaLenBstr
0041D9C9 .83F8 20 CMP EAX,20 <--- 注册码必须等于 32 位
0041D9CC .0F85 6402>JNZ unpacked.0041DC36
0041DAB2 .F7D8 NEG EAX
0041DAB4 .66:85C0 TEST AX,AX
0041DAB7 .74 25 JE SHORT unpacked.0041DADE <--- JMP
0041DAB9 .8B75 08 MOV ESI,DWORD PTR SS:
0041DC2D .66:399D 7>CMP WORD PTR SS:,BX
0041DC34 .74 25 JE SHORT unpacked.0041DC5B <--- JMP
0041DC36 >8B75 08 MOV ESI,DWORD PTR SS:
0041DE52 .FF15 8C11>CALL DWORD PTR DS:[<&MSVBVM60.__vbaVarTstNe>] ;MSVBVM60.__vbaVarTstNe
0041DE58 .66:85C0 TEST AX,AX
0041DE5B 75 69 JNZ SHORT unpacked.0041DEC6 <--- NOP
0041DE5D .8B4D 08 MOV ECX,DWORD PTR SS:
算法不难,一个字,烦! delete