Reverse/ad_cm1/solve.md
2024-09-23 17:16:29 +08:00

1.7 KiB

easy难度

密码:qWeRtZ

004010AB | 6A 07                | push 7                                       |
004010AD | 68 5C304000          | push ad_cm#1.40305C                          | 40305C:"123"
004010B2 | 68 B80B0000          | push BB8                                     |
004010B7 | FF75 08              | push dword ptr ss:[ebp+8]                    |
004010BA | E8 6F000000          | call <JMP.&_GetDlgItemTextA@16>              |
004010BF | B8 5C304000          | mov eax,ad_cm#1.40305C                       | eax:"123", 40305C:"123"
004010C4 | BB 1E304000          | mov ebx,ad_cm#1.40301E                       | ebx:"qWeRtZ", 40301E:"qWeRtZ"
004010C9 | B9 07000000          | mov ecx,7                                    |
004010CE | 8A13                 | mov dl,byte ptr ds:[ebx]                     | ebx:"qWeRtZ"
004010D0 | 3810                 | cmp byte ptr ds:[eax],dl                     | eax:"123"
004010D2 | 75 18                | jne ad_cm#1.4010EC                           | 判断
004010D4 | 40                   | inc eax                                      | eax:"123"
004010D5 | 43                   | inc ebx                                      | ebx:"qWeRtZ"
004010D6 | E2 F6                | loop ad_cm#1.4010CE                          |
004010D8 | 6A 40                | push 40                                      |
004010DA | 68 09304000          | push ad_cm#1.403009                          | 403009:"ArturDents CrackMe#1"
004010DF | 68 36304000          | push ad_cm#1.403036                          | 403036:"Yeah, you did it!"
004010E4 | FF75 08              | push dword ptr ss:[ebp+8]                    |
004010E7 | E8 48000000          | call <JMP.&_MessageBoxA@16>                  |