- UID
- 881
注册时间2005-4-13
阅读权限60
最后登录1970-1-1
亢龙有悔
  
TA的每日心情 | 奋斗 2025-1-14 21:02 |
---|
签到天数: 263 天 [LV.8]以坛为家I
|
发表于 2005-4-14 03:19:09
|
显示全部楼层
name:wenrou
sn:806344284
我比较菜,所以用OD加载后直接用串式参考,看见“Correct!!”就双击,
0040163B |. E8 80020000 call CRACKME3.004018C0 ; \CRACKME3.004018C0
00401640 |. 85C0 test eax,eax
00401642 0F85 FF000000 jnz CRACKME3.00401747
00401648 |. 8D8D ACFEFFFF lea ecx,dword ptr ss:[ebp>
0040164E |. E8 19070000 call <jmp.&MFC42.#540>
00401653 |. C645 FC 03 mov byte ptr ss:[ebp-4],3
00401657 |. 6A 66 push 66
00401659 |. 8D8D ACFEFFFF lea ecx,dword ptr ss:[ebp>
0040165F |. E8 02070000 call <jmp.&MFC42.#4160>
00401664 |. B9 07000000 mov ecx,7
00401669 |. BE 58404000 mov esi,CRACKME3.00404058 ; ASCII "Correct!! "
呵呵,往上看,找到关键跳,马上在 00401642 /0F85 FF000000 jnz CRACKME3.00401747
下断,运行程序后输入用户名,假注册码,中断后在右下角看到
0063F638 6C40FAE8 offset MFC42.#4234
0063F63C 00000001
0063F640 006542A0 ASCII "112233445" ←假码
0063F644 00000019
0063F648 FFFFFFFF
0063F64C 0063F83C
0063F650 00401643 CRACKME3.00401643
0063F654 00000167
0063F658 00200286
0063F65C 0063F674
0063F660 0000016F
0063F664 0063F824
0063F668 0063F83C
0063F66C 00401640 CRACKME3.00401640
0063F670 006542F0 ASCII "806344284" ←真码
0063F674 0063FD04
"
SO,PASS IT~~~~~
我怎么感觉比CRACK2.0简单啊,用这个测试我就能申请成员了。 |
|