见过最简单的明码存在方式?
【文章标题】: 最简单的明码存在方式?【文章作者】: vvlaw
【软件名称】: AD Sound Recorder 3.1.4
【软件大小】: 964 KB
【下载地址】: http://www.adrosoft.com/
【加壳方式】: 无壳
【使用工具】: PEid OD
【作者声明】: 只是感兴趣,没有其他目的。失误之处敬请诸位大侠赐教!
【软件介绍】: AD Sound Recorder是一款音频录音工具,它可以录制通过计算机的任何声音讯号,例如麦克风、互联网、媒体播放软件(Windows播放器、WinAmp、RealPlayer)。
PEiD查,无壳。Borland Delphi 6.0 - 7.0写的。
运行软件,有错误提示“Incorrect Code.”
这个好办,查ascii吧。OD载入,来到这里
004A7298|.55 PUSH EBP
004A7299|.68 DE734A00 PUSH adsrecor.004A73DE
004A729E|.64:FF30 PUSH DWORD PTR FS:
004A72A1|.64:8920 MOV DWORD PTR FS:,ESP
004A72A4|.68 C8000000 PUSH 0C8 ; /Timeout = 200. ms
004A72A9|.E8 D268F6FF CALL <JMP.&kernel32.Sleep> ; \Sleep
004A72AE|.C745 F8 32000>MOV DWORD PTR SS:,32
004A72B5|.BF 40064B00 MOV EDI,adsrecor.004B0640 ;ASCII 04,"1297"
004A72BA|>8D55 F0 /LEA EDX,DWORD PTR SS:
004A72BD|.8B45 FC |MOV EAX,DWORD PTR SS:
004A72C0|.8B80 14030000 |MOV EAX,DWORD PTR DS:
004A72C6|.E8 992CFBFF |CALL adsrecor.00459F64
004A72CB|.8B45 F0 |MOV EAX,DWORD PTR SS:
004A72CE|.50 |PUSH EAX
004A72CF|.8D45 EC |LEA EAX,DWORD PTR SS:
004A72D2|.8BD7 |MOV EDX,EDI
004A72D4|.E8 03D6F5FF |CALL adsrecor.004048DC
004A72D9|.8B55 EC |MOV EDX,DWORD PTR SS:
004A72DC|.58 |POP EAX
004A72DD|.E8 A2D7F5FF |CALL adsrecor.00404A84
004A72E2|.0F85 92000000 |JNZ adsrecor.004A737A
004A72E8|.BE 32000000 |MOV ESI,32
004A72ED|.BB 3C074B00 |MOV EBX,adsrecor.004B073C ;\n1157717132\n1275215397\n1566343884\n2565740578\n2662106601\n2691296134\n2891286439\n2976152334\n3129671956\n3215798652\n3310760636\n3408623238\n3613335510\n3613792109\n3682429757\n4137188610\n4342271231\n4576195302\n4794974223\n4866392884\n5488323045 ..
004A72F2|>8D55 E8 |/LEA EDX,DWORD PTR SS:
004A72F5|.8B45 FC ||MOV EAX,DWORD PTR SS:
004A72F8|.8B80 18030000 ||MOV EAX,DWORD PTR DS:
004A72FE|.E8 612CFBFF ||CALL adsrecor.00459F64
004A7303|.8B45 E8 ||MOV EAX,DWORD PTR SS:
004A7306|.50 ||PUSH EAX
004A7307|.8D45 E4 ||LEA EAX,DWORD PTR SS:
004A730A|.8BD3 ||MOV EDX,EBX
004A730C|.E8 CBD5F5FF ||CALL adsrecor.004048DC
004A7311|.8B55 E4 ||MOV EDX,DWORD PTR SS:
004A7314|.58 ||POP EAX
004A7315|.E8 6AD7F5FF ||CALL adsrecor.00404A84
004A731A|.75 54 ||JNZ SHORT adsrecor.004A7370
004A731C|.A1 EC094B00 ||MOV EAX,DWORD PTR DS:
004A7321|.C600 01 ||MOV BYTE PTR DS:,1
004A7324|.A1 200C4B00 ||MOV EAX,DWORD PTR DS:
004A7329|.C700 F6750100 ||MOV DWORD PTR DS:,175F6
004A732F|.8D45 F4 ||LEA EAX,DWORD PTR SS:
004A7332|.50 ||PUSH EAX ; /pHandle
004A7333|.68 06000200 ||PUSH 20006 ; |Access = KEY_WRITE
004A7338|.6A 00 ||PUSH 0 ; |Reserved = 0
004A733A|.68 EC734A00 ||PUSH adsrecor.004A73EC ; |software\adrosoft\ad sound recorder
004A733F|.68 01000080 ||PUSH 80000001 ; |hKey = HKEY_CURRENT_USER
004A7344|.E8 D3F5F5FF ||CALL <JMP.&advapi32.RegOpenKeyExA> ; \RegOpenKeyExA
004A7349|.85C0 ||TEST EAX,EAX
004A734B|.75 63 ||JNZ SHORT adsrecor.004A73B0
004A734D|.6A 04 ||PUSH 4 ; /BufSize = 4
004A734F|.A1 200C4B00 ||MOV EAX,DWORD PTR DS: ; |
004A7354|.50 ||PUSH EAX ; |Buffer => adsrecor.00506E30
004A7355|.6A 04 ||PUSH 4 ; |ValueType = REG_DWORD
004A7357|.6A 00 ||PUSH 0 ; |Reserved = 0
004A7359|.68 10744A00 ||PUSH adsrecor.004A7410 ; |control1
004A735E|.8B45 F4 ||MOV EAX,DWORD PTR SS: ; |
004A7361|.50 ||PUSH EAX ; |hKey
004A7362|.E8 C5F5F5FF ||CALL <JMP.&advapi32.RegSetValueExA> ; \RegSetValueExA
004A7367|.8B45 F4 ||MOV EAX,DWORD PTR SS:
004A736A|.50 ||PUSH EAX ; /hKey
004A736B|.E8 A4F5F5FF ||CALL <JMP.&advapi32.RegCloseKey> ; \RegCloseKey
004A7370|>83C3 0B ||ADD EBX,0B
004A7373|.4E ||DEC ESI
004A7374|.^ 0F85 78FFFFFF |\JNZ adsrecor.004A72F2
004A737A|>83C7 05 |ADD EDI,5
004A737D|.FF4D F8 |DEC DWORD PTR SS:
004A7380|.^ 0F85 34FFFFFF \JNZ adsrecor.004A72BA
004A7386|.A1 EC094B00 MOV EAX,DWORD PTR DS:
004A738B|.8038 00 CMP BYTE PTR DS:,0
004A738E|.75 0C JNZ SHORT adsrecor.004A739C
004A7390|.B8 24744A00 MOV EAX,adsrecor.004A7424 ;incorrect code!
004A7395|.E8 16A0F8FF CALL adsrecor.004313B0
004A739A|.EB 14 JMP SHORT adsrecor.004A73B0
004A739C|>B8 3C744A00 MOV EAX,adsrecor.004A743C ;thank you for using our product!\nyou have registered ad sound recorder!
我们在incorrect code!那行往前看,居然有
004A72ED|.BB 3C074B00 |MOV EBX,adsrecor.004B073C ;\n1157717132\n1275215397\n1566343884\n2565740578\n2662106601\n2691296134\n2891286439\n2976152334\n3129671956\n3215798652\n3310760636\n3408623238\n3613335510\n3613792109\n3682429757\n4137188610\n4342271231\n4576195302\n4794974223\n4866392884\n5488323045 ..
再往前看,居然还有1297的字样?呵呵,这两个字符串组合格式好熟悉,就等于注册框的填写形式?难道就是真码?
那就输入1297,后面再从0004A72ED行随便挑个10位数来看看?
ok,pass it :)
这好像是我见过追简单的明码存在形式了,无技术可言,大家看看罢了~ 学习了,谢谢分享。 我也是好像 在那里看过 真是简单易学 谢谢楼主啊 要是软件都是这样就好了 学习了,可见软件加密的重要性。是简单了一点,但对我等菜鸟来说也不失为一种方法。 呵呵,新手向楼上的学习
页:
[1]