论坛: 编程破解 标题: 汇编的关键跳的问题 复制本贴地址    
作者: chenfyan [chenfyan]    论坛用户   登录
Exported fn(): Base64Encode - Ord:0006h
:00405D30 55                      push ebp            '
:00405D31 8BEC                    mov ebp, esp
:00405D33 53                      push ebx
:00405D34 56                      push esi
:00405D35 57                      push edi
:00405D36 8B7D0C                  mov edi, dword ptr [ebp+0C]
:00405D39 8B7508                  mov esi, dword ptr [ebp+08]
:00405D3C 8B4510                  mov eax, dword ptr [ebp+10]
:00405D3F B903000000              mov ecx, 00000003
:00405D44 33D2                    xor edx, edx

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00405CD1(C)
|
:00405D46 F7F1                    div ecx
:00405D48 8BD8                    mov ebx, eax

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00405CD3(C)
|
:00405D4A 4B                      dec ebx
:00405D4B 85DB                    test ebx, ebx
:00405D4D 7C13                    jl 00405D62                  小于或不大于则跳转
:00405D4F 43                      inc ebx

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00405D60(C)
|
:00405D50 8B06                    mov eax, dword ptr [esi]

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00405CD7(C)
|
:00405D52 E849FFFFFF              call 00405CA0
:00405D57 8907                    mov dword ptr [edi], eax
:00405D59 83C603                  add esi, 00000003
:00405D5C 83C704                  add edi, 00000004
:00405D5F 4B                      dec ebx
:00405D60 75EE                    jne 00405D50

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00405D4D(C)
|
:00405D62 8B4510                  mov eax, dword ptr [ebp+10]
:00405D65 B903000000              mov ecx, 00000003
:00405D6A 33D2                    xor edx, edx
:00405D6C F7F1                    div ecx
:00405D6E 8BC2                    mov eax, edx
:00405D70 83F801                  cmp eax, 00000001
:00405D73 751A                    jne 00405D8F
:00405D75 8B06                    mov eax, dword ptr [esi]
:00405D77 25FF000000              and eax, 000000FF
:00405D7C E81FFFFFFF              call 00405CA0
:00405D81 25FFFF0000              and eax, 0000FFFF
:00405D86 0D00003D3D              or eax, 3D3D0000
:00405D8B 8907                    mov dword ptr [edi], eax
:00405D8D EB1D                    jmp 00405DAC

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00405D73(C)
|
:00405D8F 83F802                  cmp eax, 00000002
:00405D92 7518                    jne 00405DAC
:00405D94 8B06                    mov eax, dword ptr [esi]
:00405D96 25FFFF0000              and eax, 0000FFFF
:00405D9B E800FFFFFF              call 00405CA0
:00405DA0 25FFFFFF00              and eax, 00FFFFFF
:00405DA5 0D0000003D              or eax, 3D000000
:00405DAA 8907                    mov dword ptr [edi], eax

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:00405D8D(U), :00405D92(C)
|
:00405DAC 5F                      pop edi
:00405DAD 5E                      pop esi
:00405DAE 5B                      pop ebx
:00405DAF 5D                      pop ebp
:00405DB0 C20C00                  ret 000C


:00405DB3 90                      nop
帮忙找出这段代码的关键跳的问题

地主 发表时间: 05-08-25 14:49

回复: baihai [baihai]   论坛用户   登录
老大,能给点原代码或出差的程序段吗?
看这个太晕

B1层 发表时间: 05-09-15 11:04

论坛: 编程破解

20CN网络安全小组版权所有
Copyright © 2000-2010 20CN Security Group. All Rights Reserved.
论坛程序编写:NetDemon

粤ICP备05087286号