so_damn_insane (![]() @ 2007-04-13 18:02:00 |
![]() |
![]() |
![]() |
|
![]() |
|
![]() |
|
![]() |
![]() |
![]() |
Mūzika: | RATM |
Entry tags: | slashdot |
caur /.
Tādi hakeri...
The debugger allowed us to place a breakpoint immediately after the call to VerifyPassWord(), upon which we entered a fictional password and changed the return value 0 in the register to 1.
Atceros, kā ar HIEW.EXE laboju Diablo2 character failus. Convert to hex.. reverse byte sequence.. voila!