⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 dsa算法的理论,实现,以及在破解中的应用2.htm

📁 dsa加密算法
💻 HTM
字号:
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<!-- saved from url=(0051)http://www.chat001.com/forum/crackforum/269525.html -->
<HTML><HEAD><TITLE>Crack论坛</TITLE>
<META http-equiv=Content-Type content="text/html; charset=gb_2312-80">
<STYLE type=text/css>BODY {
	FONT-SIZE: 9pt; FONT-FAMILY: "宋体"
}
A {
	FONT-SIZE: 9pt; FONT-FAMILY: "宋体"
}
TD {
	FONT-SIZE: 9pt; FONT-FAMILY: "宋体"
}
A {
	TEXT-TRANSFORM: none; TEXT-DECORATION: none
}
A:hover {
	COLOR: red; TEXT-DECORATION: underline
}
</STYLE>

<META content="MSHTML 6.00.2600.0" name=GENERATOR></HEAD>
<BODY text=#000000 vLink=#000000 aLink=#000000 link=#000000 bgColor=#ecedf4 
leftMargin=0 background=DSA算法的理论,实现,以及在破解中的应用2.files/back.gif topMargin=0><!-- 以下为论坛的最上面的连接条 --><!-- 以下为论坛主体内容 -->
<DIV align=left><B><BR>Crack论坛</B>    <A 
href="http://www.chat001.com/forum/crackforum/index.html">返回首页 </A><BR><BR>
<TABLE cellSpacing=0 width="100%" bgColor=#a2cefb border=0>
  <TBODY>
  <TR>
    <TD width="100%" 
      height=18>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
      <A href="http://www.chat001.com/userreg.html">新来的客人想发言必须注册!请点击此处!</A> 
  </TD></TR></TBODY></TABLE><BR></DIV><B>原有信息:</B><BR><FONT color=blue>序 
号:</FONT>269525<BR><FONT color=blue>标 题:</FONT>(二) (13千字)<BR><FONT 
color=blue>发信人:</FONT>娃娃[CCG]<BR><FONT color=blue>时 间:</FONT>2003-8-12 
12:27:53<BR><FONT color=blue>阅读次数:</FONT>276<BR><FONT 
color=blue>详细信息:</FONT><BR>
<BLOCKQUOTE>[第二部分: 签名篇] <BR><BR>&nbsp; &nbsp; 介绍完理论之后 我们来实践了解一下: <BR>&nbsp; 
  &nbsp; 目标: pDriLl's Crypto KeygenMe #4 <BR>&nbsp; &nbsp; 主要工具: 
  C32Asm(感谢pll621/CCG 送给我Keyfile); Ollydbg1.09d; <BR>&nbsp; &nbsp; &nbsp; &nbsp; 
  &nbsp; &nbsp; &nbsp; BigInt Calc Pro 1.2(感谢Stkman/CCG 送给我Keyfile) <BR>&nbsp; 
  &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 等等.... <BR><BR>&nbsp; &nbsp; 
  先脱壳:用CoolDumper找到OEP是407952 然后使用 ImportREC1.6f 修复IAT表。 <BR>&nbsp; &nbsp; 
  用Ollydbg载入程序 下断点 BPX GetDigItem 断下后走到不远处: <BR><BR>004012A6&nbsp; . LEA 
  EBX,DWORD PTR SS:[EBP-104] <BR>004012AC&nbsp; . MOV DWORD PTR DS:[EBX],EAX 
  <BR>004012AE&nbsp; . POP EBX <BR>004012AF&nbsp; . CMP DWORD PTR 
  SS:[EBP-1D0],0&nbsp; // 该不会连名字都不输入吧 <BR>004012B6&nbsp; . JNZ SHORT 
  Dumped4W.004012DE&nbsp; <BR>004012B8&nbsp; . PUSH 0 <BR>004012BA&nbsp; . LEA 
  EAX,DWORD PTR SS:[EBP-3C] <BR>004012C0&nbsp; . PUSH EAX <BR>004012C1&nbsp; . 
  LEA EAX,DWORD PTR SS:[EBP-20] <BR>004012C7&nbsp; . PUSH EAX <BR>004012C8&nbsp; 
  . LEA EAX,DWORD PTR SS:[EBP+8] <BR>004012CE&nbsp; . MOV EAX,DWORD PTR DS:[EAX] 
  <BR>004012D0&nbsp; . PUSH EAX <BR>004012D1&nbsp; . LEA EAX,DWORD PTR 
  DS:[4017BD] <BR>004012D7&nbsp; . PUSH EAX <BR>004012D8&nbsp; .-JMP DWORD PTR 
  DS:[40E9A4]&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; ;&nbsp; 
  user32.MessageBoxA <BR>004012DE&nbsp; &nbsp; LEA EAX,DWORD PTR SS:[EBP-22C] 
  <BR>004012E4&nbsp; . PUSH EAX <BR>004012E5&nbsp; . CALL 
  Dumped4W.00401900&nbsp; // 过了这个CALL, DB EAX 就看到: <BR><BR>0012F878&nbsp; 01 23 
  45 67 89 AB CD EF FE DC BA 98 76 54 32 10&nbsp; #Eg壂惋

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -