1. Open it's a ghost.
2. After the random input, you can see "The year You do not have frog Frog Meng yo" then to search ASCII code.
Follow up after finding.
3. The entrance was found.
And make a mark on the next breakpoint.
4. Clear the stack in the previous steps
5. Run here is to enter the user name, because the program is the debug version, so the comments are written very clearly.
6. The program runs to this step, you can start to enter the user name password.
This call is used to enter the user name.
This is used to enter the password.
Press F8 to run one step at a
After the user name and password are entered, F8 runs.
Know that the username is to each of the first and 3 XOR, plus 3.
learned that the password is to each of the first minus 4 and then 4 different or.
7.
After that, the user name and password are compared again. The same is true.
The final idea is jiangzi.
User and Mima to meet the following relationships
([User]xor3) +3== ([mima]-4) Xor4
The 5th algorithm's cm crack idea