so_damn_insane (so_damn_insane) rakstīja, @ 2007-04-13 18:02:00 |
|
|||
Mūzika: | RATM |
caur /.
Tādi hakeri...
The debugger allowed us to place a breakpoint immediately after the call to VerifyPassWord(), upon which we entered a fictional password and changed the return value 0 in the register to 1.
Atceros, kā ar HIEW.EXE laboju Diablo2 character failus. Convert to hex.. reverse byte sequence.. voila!
Nopūsties: