- UID
- 30436
注册时间2007-4-1
阅读权限30
最后登录1970-1-1
龙战于野

TA的每日心情 | 开心 2020-8-30 18:31 |
---|
签到天数: 52 天 [LV.5]常住居民I
|
发表于 2008-7-31 23:30:37
|
显示全部楼层
简单分析了一下算法。分析有误请指教。
004012AE C745 F4 0100000>MOV DWORD PTR SS:[EBP-C],1 ; [EBP-C]初始化为1
004012B5 837D F4 0A CMP DWORD PTR SS:[EBP-C],0A ; [EBP-C]和0A比较
004012B9 7E 05 JLE SHORT cm2.004012C0 ; 小于等于就跳
004012BB EB 18 JMP SHORT cm2.004012D5
004012BD 8D76 00 LEA ESI,DWORD PTR DS:[ESI]
004012C0 8B45 FC MOV EAX,DWORD PTR SS:[EBP-4] ; 把16进制的用户名送给EAX
004012C3 8B55 F0 MOV EDX,DWORD PTR SS:[EBP-10] ; EDX=[EBP-10]
004012C6 01D0 ADD EAX,EDX ; EAX=EAX+EDX
004012C8 8B55 F4 MOV EDX,DWORD PTR SS:[EBP-C] ; EDX=[EBP-C]
004012CB 01C2 ADD EDX,EAX ; EDX=EDX+EAX
004012CD 8955 F0 MOV DWORD PTR SS:[EBP-10],EDX ; [EBP-10]=EDX
004012D0 FF45 F4 INC DWORD PTR SS:[EBP-C] ; [EBP-C]+1
004012D3 ^ EB E0 JMP SHORT cm2.004012B5
004012D5 837D FC 00 CMP DWORD PTR SS:[EBP-4],0
004012D9 7F 15 JG SHORT cm2.004012F0
004012DB 83C4 F4 ADD ESP,-0C
004012DE 68 31124000 PUSH cm2.00401231 ; 请输入用户名\n
004012E3 E8 40010000 CALL <JMP.&msvcrt.printf>
004012E8 83C4 10 ADD ESP,10
004012EB EB 33 JMP SHORT cm2.00401320
004012ED 8D76 00 LEA ESI,DWORD PTR DS:[ESI]
004012F0 8B45 F8 MOV EAX,DWORD PTR SS:[EBP-8] ; 把16进制的假码送给EAX
004012F3 3B45 F0 CMP EAX,DWORD PTR SS:[EBP-10] ; EAX和[EBP-10]比较
004012F6 75 18 JNZ SHORT cm2.00401310 ; 不相等就GAME OVER |
本帖子中包含更多资源
您需要 登录 才可以下载或查看,没有账号?加入我们
x
|