码迷,mamicode.com
首页 > 其他好文 > 详细

逆向笔记014

时间:2015-06-12 17:06:41      阅读:108      评论:0      收藏:0      [点我收藏+]

标签:

00401010   push        ebp
00401011   mov         ebp,esp
00401013   sub         esp,50h
00401016   push        ebx
00401017   push        esi
00401018   push        edi
00401019   lea         edi,[ebp-50h]
0040101C   mov         ecx,14h
00401021   mov         eax,0CCCCCCCCh
00401026   rep stos    dword ptr [edi]


00401028   mov         dword ptr [ebp-10h],1;[ebp-10h]=1
;调用    printf 
0040102F   push        offset string "\xc7\xeb\xca\xe4\xc8\xeb\xc1\xbd\xb8\xf6\xca\xfd\xa3\xacx\xba\xcdy\xa3\xa
00401034   call        printf (00401160)
00401039   add         esp,4

;调用scanf("%d%d",5,3)
0040103C   lea         eax,[ebp-0Ch]
0040103F   push        eax
00401040   lea         ecx,[ebp-8]
00401043   push        ecx
00401044   push        offset string "%d%d" (00425054)
00401049   call        scanf (00401100)
0040104E   add         esp,0Ch

00401051   mov         dword ptr [ebp-4],1

00401051   mov         dword ptr [ebp-4],1
00401058   jmp         main+53h (00401063)
0040105A   mov         edx,dword ptr [ebp-4]
0040105D   add         edx,1;[ebp-4]+1
00401063   mov         eax,dword ptr [ebp-4]
00401066   cmp         eax,dword ptr [ebp-0Ch]
00401069   jg          main+6Fh (0040107f);如果[ebp-4]<[ebp-0Ch]则跳转
0040106B   mov         eax,dword ptr [ebp-10h]
0040106E   imul        eax,dword ptr [ebp-8];[ebp-10h]=[ebp-08h]*[ebp-10h]
00401072   cdq;将eax中的符号拓展到ecx中
00401073   mov         ecx,3E8h
00401078   idiv        eax,ecx;[ebp-10h]/3E8h  将余数送入edx
0040107A   mov         dword ptr [ebp-10h],edx;[ebp-10h]=edx
0040107D   jmp         main+4Ah (0040105a);跳到0040105a


0040107F   cmp         dword ptr [ebp-10h],64h
00401083   jl          main+90h (004010a0);[ebp-10h]<64h转移
00401085   mov         edx,dword ptr [ebp-10h]
00401088   push        edx
00401089   mov         eax,dword ptr [ebp-0Ch]
0040108C   push        eax
0040108D   mov         ecx,dword ptr [ebp-8]
00401090   push        ecx
00401091   push        offset string "%d^%d\xb5\xc4\xd7\xee\xba\xf3\xc8\xfd\xce\xbb\xca\xc7\xa3\xba%d\n" (00425
00401096   call        printf (00401160)
0040109B   add         esp,10h
0040109E   jmp         main+0A9h (004010b9)

004010A0   mov         edx,dword ptr [ebp-10h]
004010A3   push        edx
004010A4   mov         eax,dword ptr [ebp-0Ch]
004010A7   push        eax
004010A8   mov         ecx,dword ptr [ebp-8]
004010AB   push        ecx
004010AC   push        offset string "%d^%d\xb5\xc4\xd7\xee\xba\xf3\xc8\xfd\xce\xbb\xca\xc7\xa3\xba0%d\n" (0042
004010B1   call        printf (00401160)
004010B6   add         esp,10h

004010B9   xor         eax,eax
004010BB   pop         edi
004010BC   pop         esi
004010BD   pop         ebx
004010BE   add         esp,50h
004010C1   cmp         ebp,esp
004010C3   call        __chkesp (004011e0)
004010C8   mov         esp,ebp
004010CA   pop         ebp
004010CB   ret

 

逆向笔记014

标签:

原文地址:http://www.cnblogs.com/zheh/p/4571969.html

(0)
(0)
   
举报
评论 一句话评论(0
登录后才能评论!
© 2014 mamicode.com 版权所有  联系我们:gaon5@hotmail.com
迷上了代码!