发布我写的第二个CrackeMe
我的第二个CrackeMe初完是10.31
今天再次修改了一下~
加了FSG壳~~
相信对于你来说不是很难的~~
爆破很容易的~~
但我还是想要你的算法~~
pentacle
2005.11.10晚 汗!没人玩? 还是老大牛啊~~ 004542B0 push ebp
004542B1 mov ebp, esp
004542B3 mov ecx, 6
004542B8 /push 0
004542BA |push 0
004542BC |dec ecx
004542BD \jnz short 5_.004542B8
004542BF push ebx
004542C0 mov ebx, eax
004542C2 xor eax, eax
004542C4 push ebp
004542C5 push 5_.0045448D
004542CA push dword ptr fs:
004542CD mov dword ptr fs:, esp
004542D0 lea edx, dword ptr ss:
004542D3 mov eax, dword ptr ds:
004542D9 call 5_.00433160
004542DE mov eax, dword ptr ss:
004542E1 push eax
004542E2 lea edx, dword ptr ss:
004542E5 mov eax, dword ptr ds:
004542EB call 5_.00433160
004542F0 mov eax, dword ptr ss: ;随机数
004542F3 call 5_.00408340
004542F8 xor eax, 3039 ;随机数 XOR 0x3039
004542FD lea edx, dword ptr ss:
00454300 call 5_.00408204
00454305 mov edx, dword ptr ss: ;变十进制串为第一组
00454308 pop eax
00454309 call 5_.00404648
0045430E jnz 5_.004543F4
00454314 lea edx, dword ptr ss:
00454317 mov eax, dword ptr ds:
0045431D call 5_.00433160
00454322 mov eax, dword ptr ss:
00454325 push eax
00454326 lea edx, dword ptr ss:
00454329 mov eax, dword ptr ds:
0045432F call 5_.00433160
00454334 mov eax, dword ptr ss: ;随机数
00454337 call 5_.00408340 ;变十六进制
0045433C xor eax, 10932 ;随机数 XOR 0x10932
00454341 lea edx, dword ptr ss:
00454344 call 5_.00408204
00454349 mov edx, dword ptr ss: ;变十进制串为第二组
0045434C pop eax
0045434D call 5_.00404648
00454352 jnz 5_.004543F4
00454358 lea edx, dword ptr ss:
0045435B mov eax, dword ptr ds:
00454361 call 5_.00433160
00454366 mov eax, dword ptr ss:
00454369 push eax
0045436A lea edx, dword ptr ss:
0045436D mov eax, dword ptr ds:
00454373 call 5_.00433160
00454378 mov eax, dword ptr ss: ;随机数
0045437B call 5_.00408340
00454380 xor eax, 0E752 ;随机数 XOR 0xE752
00454385 lea edx, dword ptr ss:
00454388 call 5_.00408204
0045438D mov edx, dword ptr ss: ;变十进制为第三组
00454390 pop eax
00454391 call 5_.00404648
00454396 jnz short 5_.004543F4
00454398 lea edx, dword ptr ss:
0045439B mov eax, dword ptr ds:
004543A1 call 5_.00433160
004543A6 mov eax, dword ptr ss:
004543A9 push eax
004543AA lea edx, dword ptr ss:
004543AD mov eax, dword ptr ds:
004543B3 call 5_.00433160
004543B8 mov eax, dword ptr ss: ;随机数
004543BB call 5_.00408340
004543C0 xor eax, 0CF83 ;随机数 XOR 0X0CF83
004543C5 lea edx, dword ptr ss:
004543C8 call 5_.00408204
004543CD mov edx, dword ptr ss: ;变十进制为第四组
004543D0 pop eax
004543D1 call 5_.00404648
004543D6 jnz short 5_.004543F4
004543D8 xor edx, edx
004543DA mov eax, dword ptr ds:
004543E0 call 5_.00433080
004543E5 mov dl, 1
004543E7 mov eax, dword ptr ds:
004543ED call 5_.00433080
004543F2 jmp short 5_.00454428
请问这个随机数字是怎么算出来的?
/:? 嗯,都是 Xor 运算,关键是这个随机数不知怎么搞出来的,如果写注册机这个如何来实现 HOHO~
OCN的兄弟已经把破文写出来了~
随机数:取CPU即时速率,精确到毫秒~ http://ocn.e5v.com/cgi-bin/bbs/ccb/topic_view.cgi?forum=24&publishtime_id=0024051111014753&article_id=0024051111014753&xxx=0&class=&new_window=1
OCN的链接
破文写的很详细~~ 谢谢提供,学习啦。 慢慢学习~~~ 学习,破解中
页:
[1]
2