Borland Delphi 6.0 - 7.0编写的程序请大家给点破解思路
注册按钮已经找到了..软件是网络验证的,绑定了硬盘主板和网卡。求高手给点破解思路吧!!
004AF8F4 .55 push ebp
004AF8F5 .8BEC mov ebp,esp
004AF8F7 .B9 09000000 mov ecx,9
004AF8FC >6A 00 push 0
004AF8FE .6A 00 push 0
004AF900 .49 dec ecx
004AF901 .^ 75 F9 jnz short un_nurol.004AF8FC
004AF903 .53 push ebx
004AF904 .56 push esi
004AF905 .57 push edi
004AF906 .8955 F8 mov dword ptr ss:,edx
004AF909 .8945 FC mov dword ptr ss:,eax
004AF90C .33C0 xor eax,eax
004AF90E .55 push ebp
004AF90F .68 48FB4A00 push un_nurol.004AFB48
004AF914 .64:FF30 push dword ptr fs:
004AF917 .64:8920 mov dword ptr fs:,esp
004AF91A .8D55 EC lea edx,dword ptr ss:
004AF91D .8B45 FC mov eax,dword ptr ss:
004AF920 .8B80 F8020000 mov eax,dword ptr ds:
004AF926 .E8 9D4EF9FF call un_nurol.004447C8
004AF92B .8B55 EC mov edx,dword ptr ss:
004AF92E .B8 18004C00 mov eax,un_nurol.004C0018
004AF933 .E8 344DF5FF call un_nurol.0040466C
004AF938 .833D 18004C00>cmp dword ptr ds:,0
004AF93F .0F84 C6010000 je un_nurol.004AFB0B
004AF945 .C705 2C004C00>mov dword ptr ds:,1
004AF94F .E8 F4F9FFFF call un_nurol.004AF348
004AF954 .833D 14004C00>cmp dword ptr ds:,1
004AF95B .75 0C jnz short un_nurol.004AF969
004AF95D .33C0 xor eax,eax
004AF95F .A3 14004C00 mov dword ptr ds:,eax
004AF964 .E8 43FAFFFF call un_nurol.004AF3AC
004AF969 >833D 14004C00>cmp dword ptr ds:,1
004AF970 .0F85 81010000 jnz un_nurol.004AFAF7
004AF976 .E8 EDFAFFFF call un_nurol.004AF468
004AF97B .84C0 test al,al
004AF97D .0F84 74010000 je un_nurol.004AFAF7
004AF983 .A0 58FB4A00 mov al,byte ptr ds:
004AF988 .50 push eax
004AF989 .8D45 E8 lea eax,dword ptr ss:
004AF98C .50 push eax
004AF98D .E8 72F5FFFF call un_nurol.004AEF04
004AF992 .8D55 E4 lea edx,dword ptr ss: ;硬盘
004AF995 .E8 7A9DF5FF call un_nurol.00409714
004AF99A .8B45 E4 mov eax,dword ptr ss:
004AF99D .33C9 xor ecx,ecx
004AF99F .BA 64FB4A00 mov edx,un_nurol.004AFB64
004AF9A4 .E8 2BE2F5FF call un_nurol.0040DBD4
004AF9A9 .8B55 E8 mov edx,dword ptr ss:
004AF9AC .B8 28004C00 mov eax,un_nurol.004C0028
004AF9B1 .E8 B64CF5FF call un_nurol.0040466C
004AF9B6 .8D45 E0 lea eax,dword ptr ss:
004AF9B9 .E8 F2F6FFFF call un_nurol.004AF0B0
004AF9BE .FF75 E0 push dword ptr ss:
004AF9C1 .FF35 28004C00 push dword ptr ds:
004AF9C7 .8D45 DC lea eax,dword ptr ss:
004AF9CA .E8 FDF8FFFF call un_nurol.004AF2CC
004AF9CF .FF75 DC push dword ptr ss: ;主板
004AF9D2 .8D45 D8 lea eax,dword ptr ss:
004AF9D5 .E8 B2F6FFFF call un_nurol.004AF08C
004AF9DA .FF75 D8 push dword ptr ss:
004AF9DD .8D45 F4 lea eax,dword ptr ss:
004AF9E0 .BA 04000000 mov edx,4
004AF9E5 .E8 CA4FF5FF call un_nurol.004049B4
004AF9EA .8D55 C4 lea edx,dword ptr ss:
004AF9ED .8B45 F4 mov eax,dword ptr ss:
004AF9F0 .E8 73F1FFFF call un_nurol.004AEB68
004AF9F5 .8D45 C4 lea eax,dword ptr ss:
004AF9F8 .8D55 D4 lea edx,dword ptr ss:
004AF9FB .E8 DCF1FFFF call un_nurol.004AEBDC
004AFA00 .8B55 D4 mov edx,dword ptr ss:
004AFA03 .B8 24004C00 mov eax,un_nurol.004C0024
004AFA08 .E8 5F4CF5FF call un_nurol.0040466C
004AFA0D .33C9 xor ecx,ecx
004AFA0F .B2 01 mov dl,1
004AFA11 .A1 90D34800 mov eax,dword ptr ds:
004AFA16 .E8 5DDEFDFF call un_nurol.0048D878
004AFA1B .8B55 FC mov edx,dword ptr ss:
004AFA1E .8982 08030000 mov dword ptr ds:,eax
004AFA24 .8B55 F8 mov edx,dword ptr ss:
004AFA27 .8B45 FC mov eax,dword ptr ss:
004AFA2A .E8 0DFDFFFF call un_nurol.004AF73C
004AFA2F .8B45 FC mov eax,dword ptr ss:
004AFA32 .8B80 04030000 mov eax,dword ptr ds:
004AFA38 .C640 38 00 mov byte ptr ds:,0
004AFA3C .8B45 FC mov eax,dword ptr ss:
004AFA3F .8B80 08030000 mov eax,dword ptr ds:
004AFA45 .E8 7AFAFDFF call un_nurol.0048F4C4
004AFA4A .83C0 24 add eax,24
004AFA4D .50 push eax
004AFA4E .8D55 C0 lea edx,dword ptr ss:
004AFA51 .B8 70FB4A00 mov eax,un_nurol.004AFB70 ;ASCII "D379DA39FA0EE533DB66C47AEB40F330C524CC3AE100A932C065CF3BF002E022D6"
004AFA56 .E8 35FAFFFF call un_nurol.004AF490
004AFA5B .8B55 C0 mov edx,dword ptr ss:
004AFA5E .58 pop eax
004AFA5F .E8 084CF5FF call un_nurol.0040466C
004AFA64 .33D2 xor edx,edx
004AFA66 .55 push ebp
004AFA67 .68 E8FA4A00 push un_nurol.004AFAE8
004AFA6C .64:FF32 push dword ptr fs:
004AFA6F .64:8922 mov dword ptr fs:,esp
004AFA72 .8B45 FC mov eax,dword ptr ss:
004AFA75 .8B80 08030000 mov eax,dword ptr ds:
004AFA7B .C780 9C000000>mov dword ptr ds:,7530
004AFA85 .8B15 20004C00 mov edx,dword ptr ds:
004AFA8B .52 push edx
004AFA8C .8B0D 1C004C00 mov ecx,dword ptr ds:
004AFA92 .8B15 10004C00 mov edx,dword ptr ds:
004AFA98 .E8 57E1FDFF call un_nurol.0048DBF4
004AFA9D .8D45 F0 lea eax,dword ptr ss:
004AFAA0 .8B15 20004C00 mov edx,dword ptr ds:
004AFAA6 .8B52 04 mov edx,dword ptr ds:
004AFAA9 .E8 024CF5FF call un_nurol.004046B0
004AFAAE .8D55 B8 lea edx,dword ptr ss:
004AFAB1 .B8 BCFB4A00 mov eax,un_nurol.004AFBBC ;ASCII "FCD899B8"
004AFAB6 .E8 C1FAFFFF call un_nurol.004AF57C
004AFABB .8B45 B8 mov eax,dword ptr ss:
004AFABE .8D55 BC lea edx,dword ptr ss:
004AFAC1 .E8 CAF9FFFF call un_nurol.004AF490
004AFAC6 .8B55 BC mov edx,dword ptr ss:
004AFAC9 .8B45 F0 mov eax,dword ptr ss:
004AFACC .E8 6F4FF5FF call un_nurol.00404A40
004AFAD1 .75 0B jnz short un_nurol.004AFADE
004AFAD3 .8B55 F8 mov edx,dword ptr ss:
004AFAD6 .8B45 FC mov eax,dword ptr ss:
004AFAD9 .E8 8AFBFFFF call un_nurol.004AF668
004AFADE >33C0 xor eax,eax
004AFAE0 .5A pop edx
004AFAE1 .59 pop ecx
004AFAE2 .59 pop ecx
004AFAE3 .64:8910 mov dword ptr fs:,edx
004AFAE6 .EB 0F jmp short un_nurol.004AFAF7
004AFAE8 .^ E9 F741F5FF jmp un_nurol.00403CE4
004AFAED .E8 A6CBF5FF call un_nurol.0040C698
004AFAF2 .E8 5545F5FF call un_nurol.0040404C
004AFAF7 >833D 14004C00>cmp dword ptr ds:,0
004AFAFE .75 0B jnz short un_nurol.004AFB0B
004AFB00 .8B55 F8 mov edx,dword ptr ss:
004AFB03 .8B45 FC mov eax,dword ptr ss:
004AFB06 .E8 5DFBFFFF call un_nurol.004AF668
004AFB0B >33C0 xor eax,eax ;111111111111
[ 本帖最后由 xieyu1101 于 2009-2-23 04:45 编辑 ] 呵呵,要暴破可能还要破坏他的网络验证。 比较高级的东东 我讨厌网络验证 贴个地址看看~ 不动态调试,你就这样贴点汇编代码,估计没有几个看得明白。 只贴出来这个看不出来什么吧 找到了注册の按钮事件.就开始F8 F7跟踪看看吧~ 软件壳已经脱了!已经找到了注册的按钮事件了 可能要一个能用的正版把硬盘主板和网卡改成正版的!!
下载地址http://www.qiannao.com/space/show/qiannao/上传分享/2009/2/24/LAN-No_1_.2.24.rar/.page 找到联网的函数,删了,然后把下面的跳转改了。。。
页:
[1]
2