Implementation: smiley _Crack

Direct load OD, observed that pop may be MessageBox, then search for the windows api functions

Follow the disassembly window follow function, here, directly breakpoints

Run the program, go to the breakpoint, as FIG.

Then find Stack window have to call CALL, this call is naturally MessageBox function, then direct the disassembly window for this call be followed, found a jump affect whether or not to operate above the call, then the next breakpoint directly

Then continue the program, but also an error, continue to follow this CALL

00401245 . E8 18010000 call CRACKME.00401362

Above the presence of the jump instruction, a breakpoint

00,401,243th / 74 07 short CRACKME.0040124C

Then continue the program, click on the re-registration, the first breakpoint went before, a nop instruction

Continue to run, to place a second error, be unconditional jump jmp

Finally, we continue to find a successful pop

Save to save the above to open the program to test success

Guess you like

Origin www.cnblogs.com/zpchcbd/p/12056409.html