DremEdit2.28如何算注册码,注册码,加密算法 2008年06月23日 星期一 下午 12:21 http://shengqh.yeah.net 请高手帮我注上含义,谢谢! 015F:00516604 MOV EAX,[EBP-04] 015F:00516607 CALL 004A1690 015F:0051660C TEST AL,AL 015F:0051660E JZ NEAR 005166DE --->jump 在TRW2000环境中,输入何指令能让JZ不jump 因为我想运行下面的指令 --------------------------------------- 015F:00516614 LEA EDX,[EBP-08] 015F:00516617 MOV EAX,[EBX 0300] 015F:0051661D CALL 00437D14 015F:00516622 MOV EAX,[EBP-08] 015F:00516625 PUSH EAX 015F:00516626 LEA EDX,[EBP-0C] 015F:00516629 MOV EAX,[EBX 02F4] 015F:0051662F CALL 00437D14 015F:00516634 MOV EAX,[EBP-0C] 015F:00516637 POP EDX 015F:00516638 CALL 004043AC 015F:0051663D TEST EAX,EAX 015F:0051663F JNG NEAR 005166DE 015F:00516645 LEA EAX,[EBP-10] 015F:00516648 CALL 004A1610 015F:0051664D MOV ECX,[EBP-10] 015F:00516650 MOV DL,01 015F:00516652 MOV EAX,[00460860] 015F:00516657 CALL 00460908 015F:0051665C MOV ESI,EAX 015F:0051665E LEA EDX,[EBP-14] 015F:00516661 MOV EAX,[EBX 0300] 015F:00516667 CALL 00437D14 015F:0051666C MOV EAX,[EBP-14] 015F:0051666F PUSH EAX 015F:00516670 MOV ECX,00516740 015F:00516675 MOV EDX,00516750 015F:0051667A MOV EAX,ESI 015F:0051667C MOV EDI,[EAX] 015F:0051667E CALL NEAR [EDI 04] 015F:00516681 LEA EDX,[EBP-18] 015F:00516684 MOV EAX,[EBX 02F4] 015F:0051668A CALL 00437D14 015F:0051668F MOV EAX,[EBP-18] 015F:00516692 PUSH EAX 015F:00516693 MOV ECX,00516760 015F:00516698 MOV EDX,00516750 015F:0051669D MOV EAX,ESI 015F:0051669F MOV EDI,[EAX] 015F:005166A1 CALL NEAR [EDI 04] 015F:005166A4 MOV EAX,ESI 015F:005166A6 CALL 004030D8 015F:005166AB PUSH BYTE 40 015F:005166AD PUSH DWORD 00516768 015F:005166B2 PUSH DWORD 00516774 015F:005166B7 MOV EAX,EBX 015F:005166B9 CALL 0043DF38 015F:005166BE PUSH EAX 015F:005166BF CALL `USER32!MessageBoxA` 015F:005166C4 MOV EAX,[0055F9F4] 015F:005166C9 MOV EAX,[EAX] 015F:005166CB MOV EDX,005167A0 015F:005166D0 CALL 00437D44 015F:005166D5 MOV EAX,EBX 015F:005166D7 CALL 00454188 015F:005166DC JMP SHORT 005166F7 ---------------------------------------- 015F:005166DE PUSH BYTE 10 015F:005166E0 PUSH DWORD 005167BC 015F:005166E5 PUSH DWORD 005167C4 015F:005166EA MOV EAX,EBX 015F:005166EC CALL 0043DF38 015F:005166F1 PUSH EAX 015F:005166F2 CALL `USER32!MessageBoxA` ------------------------------------>跳出错误对话框 015F:005166F7 XOR EAX,EAX 015F:005166F9 POP EDX 015F:005166FA POP ECX 015F:005166FB POP ECX 015F:005166FC MOV [FS:EAX],EDX 015F:005166FF PUSH DWORD 0051672E 015F:00516704 LEA EAX,[EBP-18] 015F:00516707 MOV EDX,02 015F:0051670C CALL 00403E64 015F:00516711 LEA EAX,[EBP-10] 015F:00516714 CALL 00403E40 015F:00516719 LEA EAX,[EBP-0C] 015F:0051671C MOV EDX,03 015F:00516721 CALL 00403E64 015F:00516726 RET 面是两个判断,正好3个条件限制: 1、注册码的各字符的ASCII码之和必须为13的整数倍。且注册码最少5个字符 015F:00516604 MOV EAX,[EBP-04] 015F:00516607 CALL 004A1690 ;检查累加和 015F:0051660C TEST AL,AL 015F:0051660E JZ NEAR 005166DE 2、名字必须是注册码的子串,即注册码包含名字。 015F:00516634 MOV EAX,[EBP-0C] 015F:00516637 POP EDX 015F:00516638 CALL 004043AC 015F:0051663D TEST EAX,EAX 015F:0051663F JNG NEAR 005166DE |
|小黑屋|最新主题|手机版|微赢网络技术论坛 ( 苏ICP备08020429号 )
GMT+8, 2024-9-30 03:23 , Processed in 0.215815 second(s), 12 queries , Gzip On, MemCache On.
Powered by Discuz! X3.5
© 2001-2023 Discuz! Team.