能力值:
( LV2,RANK:10 )
|
-
-
2 楼
有错误下不了!
|
能力值:
( LV9,RANK:250 )
|
-
-
3 楼
真实地址:
http://bbs.pediy.com/upload/2005/37/files/crackme[lchhome].rar
|
能力值:
( LV9,RANK:210 )
|
-
-
4 楼
既然是crackme,还用的着加壳?干脆叫unpackme好了。
|
能力值:
(RANK:650 )
|
-
-
6 楼
|
能力值:
( LV9,RANK:410 )
|
-
-
7 楼
.........
0040508E push eax
0040508F push ecx
00405090 call dword ptr ds:[<&MSVBVM60.__vbaVarTstNe>] ; MSVBVM60.__vbaVarTstNe
00405096 test ax,ax <----关键判断
00405099 mov eax,80020004
0040509E mov ecx,0A
004050A3 mov dword ptr ss:[ebp-454],eax
004050A9 mov dword ptr ss:[ebp-45C],ecx
004050AF mov dword ptr ss:[ebp-444],eax
004050B5 mov dword ptr ss:[ebp-44C],ecx
004050BB je UnPacKed.00405163 <---要跳的,不跳有你好看
004050C1 mov edi,dword ptr ds:[<&MSVBVM60.__vbaVarDup>] ; MSVBVM60.__vbaVarDup
004050C7 lea edx,dword ptr ss:[ebp-4BC]
004050CD lea ecx,dword ptr ss:[ebp-43C]
004050D3 mov dword ptr ss:[ebp-4B4],UnPacKed.004020D0
004050DD mov dword ptr ss:[ebp-4BC],ebx
004050E3 call edi ; <&MSVBVM60.__vbaVarDup>
004050E5 lea edx,dword ptr ss:[ebp-4AC]
004050EB lea ecx,dword ptr ss:[ebp-42C]
004050F1 mov dword ptr ss:[ebp-4A4],UnPacKed.004020C0
004050FB mov dword ptr ss:[ebp-4AC],ebx
00405101 call edi
00405103 lea edx,dword ptr ss:[ebp-45C]
00405109 lea eax,dword ptr ss:[ebp-44C]
0040510F push edx
00405110 lea ecx,dword ptr ss:[ebp-43C]
00405116 push eax
00405117 push ecx
00405118 lea edx,dword ptr ss:[ebp-42C]
0040511E push 35
00405120 push edx
00405121 call dword ptr ds:[<&MSVBVM60.#595>] ; MSVBVM60.rtcMsgBox <--Bad Boy!
00405127 lea edx,dword ptr ss:[ebp-4EC]
0040512D lea ecx,dword ptr ss:[ebp-54]
00405130 mov dword ptr ss:[ebp-4E4],eax
00405136 mov dword ptr ss:[ebp-4EC],3
00405140 call esi
00405142 lea eax,dword ptr ss:[ebp-45C]
00405148 lea ecx,dword ptr ss:[ebp-44C]
0040514E push eax
0040514F lea edx,dword ptr ss:[ebp-43C]
00405155 push ecx
00405156 lea eax,dword ptr ss:[ebp-42C]
0040515C push edx
0040515D push eax
0040515E jmp UnPacKed.00405200
00405163 mov edi,dword ptr ds:[<&MSVBVM60.__vbaVarDup>] ; MSVBVM60.__vbaVarDup
00405169 lea edx,dword ptr ss:[ebp-4BC]
0040516F lea ecx,dword ptr ss:[ebp-43C]
00405175 mov dword ptr ss:[ebp-4B4],UnPacKed.004020F8
0040517F mov dword ptr ss:[ebp-4BC],ebx
00405185 call edi ; <&MSVBVM60.__vbaVarDup>
00405187 lea edx,dword ptr ss:[ebp-4AC]
0040518D lea ecx,dword ptr ss:[ebp-42C]
00405193 mov dword ptr ss:[ebp-4A4],UnPacKed.004020E8
0040519D mov dword ptr ss:[ebp-4AC],ebx
004051A3 call edi
004051A5 lea ecx,dword ptr ss:[ebp-45C]
004051AB lea edx,dword ptr ss:[ebp-44C]
004051B1 push ecx
004051B2 lea eax,dword ptr ss:[ebp-43C]
004051B8 push edx
004051B9 push eax
004051BA lea ecx,dword ptr ss:[ebp-42C]
004051C0 push 35
004051C2 push ecx
004051C3 call dword ptr ds:[<&MSVBVM60.#595>] ; MSVBVM60.rtcMsgBox <--Right!
004051C9 lea edx,dword ptr ss:[ebp-4EC]
算法懒得跟了,VB的怕怕!
|
能力值:
( LV9,RANK:850 )
|
-
-
8 楼
爆破太容易,004050BB je UnPacKed.00405163 <---要跳的,不跳有你好看 改Jmp就完!!!
我认为做一个Crackme,也不能太容易爆破了,否则就没有意义了。
算法太复杂!!!
add ,sub mod and ……
太多!
可是爆破只要改一个就行!
|