看到treeview不错,一时冲动就解了它,一解不可收拾.全系列9个全找了找.
http://www.telerik.com/Default.aspx?PageId=1900
Key和IV值各控件如下:
switch (txtProductName.Text)
{
case "treeview":
{
key = new byte[0x10] {0x79, 0x55, 0x69, 0x38, 50, 90, 0x76, 0x4a, 0x6f, 0x45, 50, 0x6b, 0x6b, 0x52, 0x70, 0x39};
iv = new byte[0x10] {0x61, 0x41, 0x30, 0x76, 0x4e, 0x68, 0x47, 100, 0x45, 0x31, 0x31, 0x69, 0x4c, 0x4c, 0x63, 0x36};

break;
}
case "editor":
{
key = new byte[0x10] {70, 70, 0x36, 0x31, 0x68, 90, 0x71, 0x70, 0x38, 0x30, 0x42, 110, 0x54, 0x79, 120, 0x37};
iv = new byte[0x10] {0x72, 0x45, 0x34, 0x48, 0x6a, 120, 0x6c, 0x6c, 0x4f, 0x74, 0x30, 0x73, 0x45, 0x71, 0x6f, 0x33};
break;
}
case "spell":
{
key = new byte[0x10] {0x4e, 0x24, 0x45, 0x65, 120, 0x42, 0x4e, 0x60, 0x58, 0x59, 0x67, 0x45, 0x4d, 0x4a, 0x5c, 100};
iv = new byte[0x10] {0x52, 0x55, 0x63, 0x66, 0x42, 0x65, 0x4f, 0x5d, 0x6a, 100, 0x60, 0x45, 0x53, 0x47, 0x51, 0x43};
break;
}
case "chart":
{
key = new byte[0x10] {0x63, 0x37, 0x4a, 110, 0x35, 0x42, 0x56, 0x4f, 0x7a, 0x33, 0x31, 0x70, 0x70, 0x51, 50, 0x79};
iv = new byte[0x10] {0x63, 0x44, 0x63, 0x34, 0x38, 0x31, 0x6a, 0x47, 0x68, 0x75, 0x49, 0x70, 0x36, 120, 0x61, 0x34};

break;
}
case "rotator":
{
key = new byte[0x10] {100, 0x4a, 0x79, 0x48, 60, 70, 0x51, 0x47, 0x65, 0x51, 0x45, 0x60, 0x72, 0x72, 0x63, 0x59};
iv = new byte[0x10] {90, 0x41, 0x4e, 0x67, 0x68, 0x3b, 0x3d, 0x4e, 0x54, 0x63, 0x67, 0x66, 0x67, 0x4d, 0x53, 0x52};

break;
}
case "tabstrip":
{
key = new byte[0x10] {0x69, 0x69, 0x47, 0x64, 0x6B, 0x71, 0x77, 0x37, 0x31, 0x33, 0x33, 0x6B, 0x4B, 0x46, 0x68, 0x62};
iv = new byte[0x10] {0x56, 0x76, 0x38, 0x31, 0x5A, 0x65, 0x54, 0x79, 0x70, 0x37, 0x38, 0x38, 0x46, 0x6C, 0x6C, 0x6F};
break;
}


case "menu":
{
key = new byte[0x10] {0x75, 0x36, 0x7a, 0x52, 50, 0x4f, 0x69, 0x47, 0x74, 0x76, 0x37, 0x31, 0x71, 0x71, 0x67, 0x6a};
iv = new byte[0x10] {0x38, 50, 0x36, 0x6b, 0x54, 0x79, 0x6f, 80, 0x67, 0x68, 0x51, 0x6a, 0x63, 0x62, 70, 0x52};

break;
}
case "panelbar":
{
key = new byte[0x10] {80, 0x43, 0x4e, 0x35, 0x77, 120, 0x59, 0x4d, 0x26, 0x59, 0x67, 0x5b, 0x63, 0x29, 90, 0x23};
iv = new byte[0x10] {0x54, 40, 0x3d, 0x6a, 0x5f, 120, 0x5e, 0x4c, 0x35, 0x2d, 0x39, 0x61, 0x67, 0x41, 0x56, 0x24};

break;
}
case "designer":
{
key = new byte[0x10] {0x67, 0x56, 0x36, 0x33, 120, 0x63, 0x45, 0x61, 0x49, 0x66, 0x54, 0x36, 50, 0x48, 0x76, 0x4f};
iv = new byte[0x10] {0x33, 0x34, 0x52, 0x66, 0x42, 110, 0x4b, 0x6a, 0x74, 0x67, 0x58, 0x35, 0x34, 0x53, 0x63, 0x61};
break;
}
}
有了key和iv以后.利用RijndaelManaged对明文进行加密.
明文格式为:
220.212.130.33none12/03/2004domain.comv2
即:
string split = Convert.ToChar(1).ToString();
ip + split + companyname +split + expdate + split +domain +split + v2 + split
加密后, 将stream转为base64string输出即是密码.呵呵.
注册了N天.第一次发内容.汗一个.实在不知道说什么好,大的说不了,小的不愿意说.呵呵.
另:那位兄弟有GMAIL的蛋的话,请送一个给我,谢谢先.我邮箱 fuck@urvv.com
http://www.telerik.com/Default.aspx?PageId=1900
Key和IV值各控件如下:
switch (txtProductName.Text)
{
case "treeview":
{
key = new byte[0x10] {0x79, 0x55, 0x69, 0x38, 50, 90, 0x76, 0x4a, 0x6f, 0x45, 50, 0x6b, 0x6b, 0x52, 0x70, 0x39};
iv = new byte[0x10] {0x61, 0x41, 0x30, 0x76, 0x4e, 0x68, 0x47, 100, 0x45, 0x31, 0x31, 0x69, 0x4c, 0x4c, 0x63, 0x36};
break;
}
case "editor":
{
key = new byte[0x10] {70, 70, 0x36, 0x31, 0x68, 90, 0x71, 0x70, 0x38, 0x30, 0x42, 110, 0x54, 0x79, 120, 0x37};
iv = new byte[0x10] {0x72, 0x45, 0x34, 0x48, 0x6a, 120, 0x6c, 0x6c, 0x4f, 0x74, 0x30, 0x73, 0x45, 0x71, 0x6f, 0x33};
break;
}
case "spell":
{
key = new byte[0x10] {0x4e, 0x24, 0x45, 0x65, 120, 0x42, 0x4e, 0x60, 0x58, 0x59, 0x67, 0x45, 0x4d, 0x4a, 0x5c, 100};
iv = new byte[0x10] {0x52, 0x55, 0x63, 0x66, 0x42, 0x65, 0x4f, 0x5d, 0x6a, 100, 0x60, 0x45, 0x53, 0x47, 0x51, 0x43};
break;
}
case "chart":
{
key = new byte[0x10] {0x63, 0x37, 0x4a, 110, 0x35, 0x42, 0x56, 0x4f, 0x7a, 0x33, 0x31, 0x70, 0x70, 0x51, 50, 0x79};
iv = new byte[0x10] {0x63, 0x44, 0x63, 0x34, 0x38, 0x31, 0x6a, 0x47, 0x68, 0x75, 0x49, 0x70, 0x36, 120, 0x61, 0x34};
break;
}
case "rotator":
{
key = new byte[0x10] {100, 0x4a, 0x79, 0x48, 60, 70, 0x51, 0x47, 0x65, 0x51, 0x45, 0x60, 0x72, 0x72, 0x63, 0x59};
iv = new byte[0x10] {90, 0x41, 0x4e, 0x67, 0x68, 0x3b, 0x3d, 0x4e, 0x54, 0x63, 0x67, 0x66, 0x67, 0x4d, 0x53, 0x52};
break;
}
case "tabstrip":
{
key = new byte[0x10] {0x69, 0x69, 0x47, 0x64, 0x6B, 0x71, 0x77, 0x37, 0x31, 0x33, 0x33, 0x6B, 0x4B, 0x46, 0x68, 0x62};
iv = new byte[0x10] {0x56, 0x76, 0x38, 0x31, 0x5A, 0x65, 0x54, 0x79, 0x70, 0x37, 0x38, 0x38, 0x46, 0x6C, 0x6C, 0x6F};
break;
}

case "menu":
{
key = new byte[0x10] {0x75, 0x36, 0x7a, 0x52, 50, 0x4f, 0x69, 0x47, 0x74, 0x76, 0x37, 0x31, 0x71, 0x71, 0x67, 0x6a};
iv = new byte[0x10] {0x38, 50, 0x36, 0x6b, 0x54, 0x79, 0x6f, 80, 0x67, 0x68, 0x51, 0x6a, 0x63, 0x62, 70, 0x52};
break;
}
case "panelbar":
{
key = new byte[0x10] {80, 0x43, 0x4e, 0x35, 0x77, 120, 0x59, 0x4d, 0x26, 0x59, 0x67, 0x5b, 0x63, 0x29, 90, 0x23};
iv = new byte[0x10] {0x54, 40, 0x3d, 0x6a, 0x5f, 120, 0x5e, 0x4c, 0x35, 0x2d, 0x39, 0x61, 0x67, 0x41, 0x56, 0x24};
break;
}
case "designer":
{
key = new byte[0x10] {0x67, 0x56, 0x36, 0x33, 120, 0x63, 0x45, 0x61, 0x49, 0x66, 0x54, 0x36, 50, 0x48, 0x76, 0x4f};
iv = new byte[0x10] {0x33, 0x34, 0x52, 0x66, 0x42, 110, 0x4b, 0x6a, 0x74, 0x67, 0x58, 0x35, 0x34, 0x53, 0x63, 0x61};
break;
}
}
有了key和iv以后.利用RijndaelManaged对明文进行加密.
明文格式为:
220.212.130.33none12/03/2004domain.comv2
即:
string split = Convert.ToChar(1).ToString();
ip + split + companyname +split + expdate + split +domain +split + v2 + split
加密后, 将stream转为base64string输出即是密码.呵呵.
注册了N天.第一次发内容.汗一个.实在不知道说什么好,大的说不了,小的不愿意说.呵呵.
另:那位兄弟有GMAIL的蛋的话,请送一个给我,谢谢先.我邮箱 fuck@urvv.com

浙公网安备 33010602011771号