- UID
- 242
注册时间2005-3-6
阅读权限40
最后登录1970-1-1
独步武林
该用户从未签到
|
发表于 2009-12-10 22:59:15
|
显示全部楼层
name: CrackMe
code: 1234567890
不需要点击按钮,直接输入就可以弹出成功对话框
IDA 扣一段出来,程序使用了些小手段,但不影响调试的
text:00401970 loc_401970: ; CODE XREF: .text:00401980j
.text:00401970 mov dl, [ecx]
.text:00401972 add ecx, 4
.text:00401975 add [esp+eax+54h], dl
.text:00401979 mov edx, [esp+34h]
.text:0040197D inc eax
.text:0040197E cmp eax, edx
.text:00401980 jl short loc_401970
.text:00401982
.text:00401982 loc_401982: ; CODE XREF: .text:0040196Cj
.text:00401982 push ebx
.text:00401983 call ??3@YAXPAX@Z ; operator delete(void *)
.text:00401988 add esp, 4
.text:0040198B lea esi, [esp+4Ch]
.text:0040198F lea eax, [esp+54h]
.text:00401993
.text:00401993 loc_401993: ; CODE XREF: .text:004019B5j
.text:00401993 mov dl, [eax]
.text:00401995 mov bl, [esi]
.text:00401997 mov cl, dl
.text:00401999 cmp dl, bl
.text:0040199B jnz short loc_4019BB
.text:0040199D test cl, cl
.text:0040199F jz short loc_4019B7
.text:004019A1 mov dl, [eax+1]
.text:004019A4 mov bl, [esi+1]
.text:004019A7 mov cl, dl
.text:004019A9 cmp dl, bl
.text:004019AB jnz short loc_4019BB
.text:004019AD add eax, 2
.text:004019B0 add esi, 2
.text:004019B3 test cl, cl
.text:004019B5 jnz short loc_401993
.text:004019B7
.text:004019B7 loc_4019B7: ; CODE XREF: .text:0040199Fj
.text:004019B7 xor eax, eax
.text:004019B9 jmp short loc_4019C0
[ 本帖最后由 lgjxj 于 2009-12-10 23:03 编辑 ] |
|