WEB开发网
开发学院网络安全黑客技术 应用olldbg脱telock加壳之菜鸟篇 阅读

应用olldbg脱telock加壳之菜鸟篇

 2007-01-12 20:12:47 来源:WEB开发网   
核心提示: F9运行,SHIFT+F9进行到这时停下0064EBA6CD 68INT 68//记住此处一定不要过了,应用olldbg脱telock加壳之菜鸟篇(2),否则不好玩0064EBA866:05 7B0CADD AX,0C7B0064EBAC66:48DEC AX0064EBAE74 55JE

F9运行,SHIFT+F9进行到这时停下 

0064EBA6 CD 68      INT 68 //记住此处一定不要过了,否则不好玩 
0064EBA8 66:05 7B0C   ADD AX,0C7B 
0064EBAC 66:48      DEC AX 
0064EBAE 74 55      JE SHORT cookbook.0064EC05 
0064EBB0 8D85 450B0000  LEA EAX,DWORD PTR SS:[EBP+B45] 
0064EBB6 894424 04    MOV DWORD PTR SS:[ESP+4],EAX 
0064EBBA 64:67:8926 0000 MOV DWORD PTR FS:[0],ESP 
0064EBC0 EB 1F      JMP SHORT cookbook.0064EBE1 
0064EBC2 CD20 8B642408  VxDCall 824648B 
0064EBC8 8B6C24 08    MOV EBP,DWORD PTR SS:[ESP+8] 
0064EBCC 8D85 7A0B0000  LEA EAX,DWORD PTR SS:[EBP+B7A] 
0064EBD2 50       PUSH EAX 
0064EBD3 EB 01      JMP SHORT cookbook.0064EBD6 
0064EBD5 E8 81AD591C   CALL 1CBE995B 
0064EBDA 0000      ADD BYTE PTR DS:[EAX],AL 
0064EBDC 88B465 CCC3EB01 MOV BYTE PTR SS:[EBP+1EBC3CC],DH 
0064EBE3 EB 33      JMP SHORT cookbook.0064EC18 
0064EBE5 DB       ???                   ; Unknown command 
0064EBE6 8BC3      MOV EAX,EBX 
0064EBE8 66:BE 4746   MOV SI,4647 
0064EBEC 66:BF 4D4A   MOV DI,4A4D 
0064EBF0 CC       INT3 
0064EBF1 90       NOP 
0064EBF2 66:81FE 4746  CMP SI,4647 
0064EBF7 75 0C      JNZ SHORT cookbook.0064EC05 
0064EBF9 64:67:8F06 0000 POP DWORD PTR FS:[0] 
0064EBFF 83C4 04     ADD ESP,4
 

上一页  1 2 3 4 5  下一页

Tags:应用 olldbg telock

编辑录入:爽爽 [复制链接] [打 印]
赞助商链接