Title: Crack 1stOptv1. 5 DemoEasily tracing Keygen 1stOptv1. 0[Author]: winndy[Contact information ]:
However, you can enter the path in the text box on the keyboard. After running, you can generate a result to save the file and save the parameter value to save the file. But click the file button next to it, but you cannot set the path in both text boxes. This is also true for the official registration version. It seems to be a bug.Since 1stOptv1. 5 is like this, why not fix this bug.0068F47A mo
eax, [***********] (or push eax)* *****: ********* Mov edx, [**********] (or push edx, etc)*****: ********** CALL *************: ********* Test eax, EAX (or test al, AL, or do not have such a sentence)*****: *********** JNZ ******** (or JZ)The memory areas pointed by EAX and EDX are the registration code we entered and the correct registration code. The register
-Belongs to the super cainiao levelA pdf cut software itself does not have a typical shell registration code error prompt box, the process is saved, directly say that the algorithm is compared to the first section of the line 0040E5CC /. 55 push ebp segment first 0040E5CD |. 8BEC mov ebp, esp0040E5CF |. 83C4 BC add esp,-440040E5D2 |. 53 push ebx0040E5D3 |. 56 push esi0040E5D4 |. 8BD8 mov ebx, eax0040E5D6 |. BE D3CE6600 mov esi, 0066CED30040E5DB |. b8 E0D06600 mov eax, 0066D0E00040E5E0 |. e8 5F3D
, 11; compare the length of the registration code to 17, including 3 "-"00405321 74 07 je short 0040532AWe know from the above that the length of the registration code should be 17 characters. After many tracking found that the final form of registration code should be like this: "XXXXX-XX-XXXXX-XX ". F8 goes down and comes to the following code.00405373 |>/33C0/xor eax, eax00405375 |. | 8A8435 08E3FF> | mov al, byte ptr [ebp + esi-1CF8]; Registration Name0040537C |. | 50 | push eax;/Arg10040537
Reverse basic Finding important/interesting stuff in the code (2) zing
Chapter 2
Call assert
Sometimes, the emergence of assert () macro is also useful: Usually this macro will leak the source file name, row number and condition.
The most useful information is included in the assert condition, from which we can infer the variable name or struct name. Another useful information is the file name. We can infer the type of code used. It is also possible to identify a famous open source library by fi
Don't optimize it! Let the compiler do it !, Optimize the Compiler
We often perform optimization on our own when writing code. In fact, most cases are unnecessary because the compiler is much smarter than you think!
The example below demonstrates that,
This is a kind of recursive writing. Many veterans will tell you that writing performance is low and loop should be used.
Int rfact (int x)
{
Int rval;
If (x
Return 1;
Rval = rfact (x-1 );
Return rval * x;
}
I don't think everyone has any object
addressofnameordinals [Index] addressoffunctions [Index];(6) By addressoffunctions [Index] getprocaddress address.
The above process uses the relative offset address. When calculating the function address, we need to add the base address of kernel32.dll to get our absolute address. The implementation code snippet is as follows (EBX is the base address of kernel32.dll ):MoV ESI, dword ptr [EBX + 3ch] // PE Header offsetAdd ESI, EBX // Replace the base address of Kernel32 with an absolute address
);ASM (xorl % EBX, % EDX );ASM (movl $0, _ booga );In the above example, we changed the values of edX and EBX in the Assembly, but due to the special processing method of GCC, the Assembly file is first formed and then handed over to the gas for assembly, therefore, gas does not know that we have changed the values of edX and EBX. If the context of the program n
out of the stack, then the parameter, and the top pointer of the stack points to the address of the initial storage, that is, the next instruction in the main function, where the program continues to run.Heap: Generally, the heap size is stored in one byte in the heap header. The specific content in the heap is arranged by the programmer.2.6 comparison of access efficiency
Char S1 [] = "aaaaaaaaaaaaa ";Char * S2 = "bbbbbbbbbbbbbbbbb ";Aaaaaaaaaaa is assigned a value at the runtime;Bbbbbbbbbbbbb
right, right-click, and disassemble. The generated code contains such a section.
* Reference to: TMainForm. Proc_005FA21C ()|005FABB4 E863F6FFFF call 005FA21C005FABB9 84C0 test al, al005 FABBB 0F85B3000000 jnz 005FAC74
Here, if jnz jumps, the entire process is over. Without a doubt, the call above jnz is the place for verification.
Double-click the call and we will track it in. There is nothing special, but such code is found
* Possible String Reference to: 'The data backup and recovery window
, and in order to confirm the idea, we'll look at the differences by disassembling them:$ objdump-d SWAP_GCCThe paragraphs that are related to the swap function are intercepted as follows:1000000000040052d :240052d: -Push%RBP340052E: - theE5 mov%rsp,%RBP4 400531: - the7d F8 mov%rdi,-0x8(%RBP)//Save the value of a5 400535: - the theF0 mov%rsi,-0x10(%RBP)//Save the value of B6 400539: -8b $F8 mov-0x8(%RBP),%Rax740053d:8bTenMOV (%rax),%edx//Tak
ThornsLinks: https://www.zhihu.com/question/21678268/answer/160663342Source: KnowCopyright belongs to the author. Commercial reprint please contact the author for authorization, non-commercial reprint please specify the source.Find the following bunch of people, whatever examining, just advertise?Landlord problems in the key words:"open source"+ "to build online courses", on the "open source" this point, many of the answers are not reliable?In fact, the development of online education for so man
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.