| so_damn_insane ( @ 2007-04-13 18:02:00 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| Mūzika: | RATM |
caur /.
Tādi hakeri...
The debugger allowed us to place a breakpoint immediately after the call to VerifyPassWord(), upon which we entered a fictional password and changed the return value 0 in the register to 1.
Atceros, kā ar HIEW.EXE laboju Diablo2 character failus. Convert to hex.. reverse byte sequence.. voila!
Nopūsties: