求助帮找一下重启验证关键CALL在哪。。
(已解决。。。谢谢楼下二位。很羡慕你们一下就找得着关键点。。。)解压后0.98M大小。Borland Delphi 6.0 - 7.0编写,已脱壳。
经分析,为重启验证注册表类型,注册信息存于中。
:00491B83 E89013FBFF call 00442F18
:00491B88 8D4DF0 lea ecx, dword ptr
* Possible StringData Ref from Code Obj ->"fzcm"
|
:00491B8B BAD81C4900 mov edx, 00491CD8
:00491B90 8B45F4 mov eax, dword ptr
:00491B93 E860F7FFFF call 004912F8
:00491B98 8B45F8 mov eax, dword ptr
:00491B9B 8B55F0 mov edx, dword ptr
:00491B9E E8392DF7FF call 004048DC
:00491BA3 742F je 00491BD4 //此处改为JNE 则输入什么注册码都可以提示注册成功。
:00491BA5 8D45FC lea eax, dword ptr
在上面的假注册成功后,重启读取注册信息后通不过验证,重新出现注册提示。
再经一个个测试,发现:
|
:00432E14 8B5D0C mov ebx, dword ptr //此处读取现存的注册用户资料。
:00432E17 8B45FC mov eax, dword ptr
:00432E1A E8C9FBFFFF call 004329E8
:00432E1F 8B5508 mov edx, dword ptr
:00432E22 8802 mov byte ptr , al
:00432E24 8BC3 mov eax, ebx
:00432E26 5F pop edi
:00491A7D 8B55E0 mov edx, dword ptr
:00491A80 8B45FC mov eax, dword ptr
:00491A83 8B8034030000 mov eax, dword ptr //把机器码送去比较。
:00491A89 E8BA14FBFF call 00442F48
:00491A8E 8D55E4 lea edx, dword ptr
:00491A91 8B45FC mov eax, dword ptr
:00491A94 8B8034030000 mov eax, dword ptr
:00491A9A E87914FBFF call 00442F18
:00491A9F 8D4DE8 lea ecx, dword ptr //传送机器码
找不到在哪比较返回值后跳到注册信息点了。
凭感觉,我只是感觉这里应该是注册入口。却不知道在哪里的地方CALL这里。。。
:00432E27 5E pop esi
:00432E28 5B pop ebx
:00432E29 8BE5 mov esp, ebp
:00432E2B 5D pop ebp
:00432E2C C20800 ret 0008
[ 本帖最后由 秋风四起 于 2008-9-12 23:29 编辑 ] 004921EB|.51 PUSH ECX
004921EC|.53 PUSH EBX
004921ED|.8945 FC MOV DWORD PTR SS:,EAX
004921F0|.33C0 XOR EAX,EAX
004921F2|.55 PUSH EBP
004921F3|.68 40254900 PUSH ZKWG3.00492540
004921F8|.64:FF30 PUSH DWORD PTR FS:
004921FB|.64:8920 MOV DWORD PTR FS:,ESP
004921FE|.B2 01 MOV DL,1
00492200|.A1 10294300 MOV EAX,DWORD PTR DS:
00492205|.E8 0608FAFF CALL ZKWG3.00432A10
0049220A|.8945 E4 MOV DWORD PTR SS:,EAX
0049220D|.BA 02000080 MOV EDX,80000002
00492212|.8B45 E4 MOV EAX,DWORD PTR SS:
00492215|.E8 9608FAFF CALL ZKWG3.00432AB0
0049221A|.33C0 XOR EAX,EAX
0049221C|.55 PUSH EBP
0049221D|.68 89224900 PUSH ZKWG3.00492289
00492222|.64:FF30 PUSH DWORD PTR FS:
00492225|.64:8920 MOV DWORD PTR FS:,ESP
00492228|.33C9 XOR ECX,ECX
0049222A|.BA 54254900 MOV EDX,ZKWG3.00492554 ;ASCII "SOFTWARE\Microsoft\Windows\fzcm\"
0049222F|.8B45 E4 MOV EAX,DWORD PTR SS:
00492232|.E8 DD08FAFF CALL ZKWG3.00432B14
00492237|.84C0 TEST AL,AL
00492239|.74 10 JE SHORT ZKWG3.0049224B
0049223B|.8D4D E0 LEA ECX,DWORD PTR SS:
0049223E|.BA 80254900 MOV EDX,ZKWG3.00492580 ;ASCII "License"
00492243|.8B45 E4 MOV EAX,DWORD PTR SS:
00492246|.E8 910AFAFF CALL ZKWG3.00432CDC
0049224B|>8D4D DC LEA ECX,DWORD PTR SS:
0049224E|.BA 90254900 MOV EDX,ZKWG3.00492590 ;ASCII "Organization"
00492253|.8B45 E4 MOV EAX,DWORD PTR SS:
00492256|.E8 810AFAFF CALL ZKWG3.00432CDC
0049225B|.8D4D D8 LEA ECX,DWORD PTR SS:
0049225E|.BA A8254900 MOV EDX,ZKWG3.004925A8 ;ASCII "RegCode"
00492263|.8B45 E4 MOV EAX,DWORD PTR SS:
00492266|.E8 710AFAFF CALL ZKWG3.00432CDC
0049226B|.33C0 XOR EAX,EAX
0049226D|.5A POP EDX
0049226E|.59 POP ECX
0049226F|.59 POP ECX
00492270|.64:8910 MOV DWORD PTR FS:,EDX
00492273|.68 90224900 PUSH ZKWG3.00492290
00492278|>8B45 E4 MOV EAX,DWORD PTR SS:
0049227B|.E8 0008FAFF CALL ZKWG3.00432A80
00492280|.8B45 E4 MOV EAX,DWORD PTR SS:
00492283|.E8 DC13F7FF CALL ZKWG3.00403664
00492288\.C3 RETN
00492289 .^ E9 3E1BF7FF JMP ZKWG3.00403DCC
0049228E .^ EB E8 JMP SHORT ZKWG3.00492278
00492290 .8D45 C8 LEA EAX,DWORD PTR SS:
00492293 .E8 98E9FFFF CALL ZKWG3.00490C30
00492298 .8B45 C8 MOV EAX,DWORD PTR SS:
0049229B .8D55 CC LEA EDX,DWORD PTR SS:
0049229E .E8 0D69F7FF CALL ZKWG3.00408BB0
004922A3 .8D45 CC LEA EAX,DWORD PTR SS:
004922A6 .50 PUSH EAX
004922A7 .8D45 C4 LEA EAX,DWORD PTR SS:
004922AA .E8 19E9FFFF CALL ZKWG3.00490BC8
004922AF .8B55 C4 MOV EDX,DWORD PTR SS:
004922B2 .58 POP EAX
004922B3 .E8 E024F7FF CALL ZKWG3.00404798
004922B8 .8B45 CC MOV EAX,DWORD PTR SS:
004922BB .8D4D E8 LEA ECX,DWORD PTR SS:
004922BE .BA B8254900 MOV EDX,ZKWG3.004925B8 ;ASCII "fzcm"
004922C3 .E8 00EEFFFF CALL ZKWG3.004910C8
004922C8 .8D4D D4 LEA ECX,DWORD PTR SS:
004922CB .BA B8254900 MOV EDX,ZKWG3.004925B8 ;ASCII "fzcm"
004922D0 .8B45 D8 MOV EAX,DWORD PTR SS:
004922D3 .E8 20F0FFFF CALL ZKWG3.004912F8
004922D8 .8B45 E8 MOV EAX,DWORD PTR SS:
004922DB .8B55 D4 MOV EDX,DWORD PTR SS:
004922DE .E8 F925F7FF CALL ZKWG3.004048DC ;关键CALL
[ 本帖最后由 gfwei1371 于 2008-9-12 21:38 编辑 ] 嗯,就这个。你能进去就是你跳过 了。。。 暴破步骤如下:
00462916 ->操作 NOP
0046292A ->操作 JMP
00462934 ->操作 NOP
004922E3 ->操作 JMP 原帖由 Luckly 于 2008-9-12 22:11 发表 https://www.chinapyg.com/images/common/back.gif
暴破步骤如下:
00462916 ->操作 NOP
0046292A ->操作 JMP
00462934 ->操作 NOP
004922E3 ->操作 JMP
嗯,经如此,是直接暴破了。
可以问一下,你是怎么找这几点的吗??
看你提的,我以前找的好像没有什么作用了。。都是在无用的地方转。。。
如果有时间的话,麻烦说下你找出暴破点的原因好吗??谢谢。
页:
[1]