160个练手CrackMe-022
2017-10-30 17:19
330 查看
1、无壳,VB
2、VB Decompiler
按钮点击事件 reg_Click() ‘402D20 中,先调用了 Crack.rgr()Public Sub rgr() '403230 loc_00403373: If 00404024h <> 0 Then GoTo loc_0040338A loc_00403892: var_ret_5 = Mid(var_1C, 6, 1) + Mid(var_20, 9, 1) + Mid(var_24, 143, 1) + Mid(var_28, 16, 1) + Mid(var_2C, 161, 1) + Mid(var_30, 171, 1) loc_004038B4: var_ret_7 = var_ret_5 + Mid(var_34, 166, 1) + Mid(var_38, 168, 1) loc_004039D9: If (var_18 = var_ret_7) = 0 Then GoTo loc_004039FD // 字串比较 loc_004039F7: ecx = CInt(1) loc_004039FD: 'Referenced from: 004039D9 loc_00403A02: GoTo loc_00403B55 loc_00403B54: Exit Sub loc_00403B55: 'Referenced from: 00403A02 End Sub
OD载入,在 004038B7 下断,输入“123”,REGISTER,运行到断点处,观察堆栈窗口。
Serial:rkh1oyie
相关文章推荐
- 160个练手CrackMe-003
- 160个练手CrackMe-031
- 160个练手CrackMe-004
- 160个练手CrackMe-014
- 160个练手CrackMe-015
- 160个练手CrackMe-038
- 160个练手CrackMe-005
- 160个练手CrackMe-016
- 160个练手CrackMe-024
- 160个练手CrackMe-026
- 160个练手CrackMe-006
- 160个练手CrackMe-017
- 160个练手CrackMe-025
- [反汇编练习] 160个CrackMe之022
- 160个练手CrackMe-007
- 160个练手CrackMe-018
- 160个练手CrackMe-039
- 160个练手CrackMe-045
- 160个练手CrackMe-008
- 160个练手CrackMe-019