各位as handsome as Pan An, national beauty and heavenly fragrance的读者们好啊,今天我们来实战一下AES算法的逆向。
样本已上传到 https://github.com/aprz512/Android-Crack
Java层的比较简单就略过了,直接看C层的。
反汇编观察
bool __fastcall Java_com_kanxue_cipher7test_MainActivity_test3(__int64 a1, __int64 a2, __int64 a3)
{
int i; // [xsp+24h] [xbp-7Ch]
__int64 v5; // [xsp+28h] [xbp-78h]
__int64 v6; // [xsp+38h] [xbp-68h]
__int128 v7[2]; // [xsp+60h] [xbp-40h]
__int128 v8; // [xsp+80h] [xbp-20h] BYREF
__int64 v9; // [xsp+98h] [xbp-8h]
v9 = *(_QWORD *)(_ReadStatusReg(ARM64_SYSREG(3, 3, 13, 0, 2)) + 40);
v6 = GetStringUTFChars(a1, a3, 0LL);
v8 = xmmword_2CB77;
v5 = sub_11210(v6, "i am encrypt key", &v8);
v7[1] = xmmword_2CB97;
v7[0] = xmmword_2CB87;
for ( i = 0; i <= 32 && *(unsigned __int8 *)(v5 + i) == *((unsigned __int8 *)v7 + i); ++i )
;
_ReadStatusReg(ARM64_SYSREG(3,&

最低0.47元/天 解锁文章

被折叠的 条评论
为什么被折叠?



