屏保密码全攻略

博客展示了一段汇编代码,包含对USER32.GetDlgItemTextA、MPR.WNetVerifyPasswordA等函数的调用,以及多个条件跳转指令,如jne、je、jmp等。代码涉及数据处理、密码验证等操作,关键跳跃处对程序流程有重要影响。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

屏保密码全攻略

* Reference To: USER32.GetDlgItemTextA, Ord:00FDh
|
:78054201 FF15DC720578 Call dword ptr [780572DC]
:78054207 85FF test edi, edi file://----由此出来
:78054209 751B jne 78054226
:7805420B 8D45FC lea eax, dword ptr [ebp-04]
:7805420E 8D8D78FFFFFF lea ecx, dword ptr [ebp+FFFFFF78]
:78054214 50 push eax
:78054215 51 push ecx

* Reference To: MPR.WNetVerifyPasswordA, Ord:004Eh
|
:78054216 E87F020000 Call 7805449A
:7805421B 85C0 test eax, eax
:7805421D 7440 je 7805425F
:7805421F B801000000 mov eax, 00000001
:78054224 EB79 jmp 7805429F

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:78054209(C)
|
:78054226 8D8574FEFFFF lea eax, dword ptr [ebp+FFFFFE74]
:7805422C 8D8D78FFFFFF lea ecx, dword ptr [ebp+FFFFFF78]
:78054232 50 push eax
:78054233 51 push ecx

* Reference To: KERNEL32.lstrlenA, Ord:02E7h
|
:78054234 FF1558720578 Call dword ptr [78057258]
:7805423A 50 push eax
:7805423B 8D8D78FFFFFF lea ecx, dword ptr [ebp+FFFFFF78]
:78054241 51 push ecx
:78054242 E89A010000 call 780543E1
:78054247 57 push edi file://这里是加密后你输入的假密码
:78054248 8D8D74FEFFFF lea ecx, dword ptr [ebp+FFFFFE74]
:7805424E 51 push ecx file://这里是加密后的密文

* Reference To: KERNEL32.lstrcmpiA, Ord:02DEh
|
:7805424F FF1554720578 Call dword ptr [78057254]
:78054255 83F801 cmp eax, 00000001
:78054258 1BC0 sbb eax, eax
:7805425A F7D8 neg eax
:7805425C 8945FC mov dword ptr [ebp-04], eax

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:7805421D(C)
|
:7805425F 33FF xor edi, edi
:78054261 B801000000 mov eax, 00000001
:78054266 397DFC cmp dword ptr [ebp-04], edi
:78054269 7534 jne 7805429F file://**********关键跳跃的地方***********

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值