- UID
- 28218
注册时间2007-2-20
阅读权限20
最后登录1970-1-1
以武会友
该用户从未签到
|
转自http://bbs.macd.cn/thread-1451935-1-1.html,我已经做小白鼠,没有问题
找不到注册过程
getwindowstexta 断下
77D3212B > 6A 0C push 0C
77D3212D 68 9021D377 push 77D32190
77D32132 E8 8964FEFF call 77D185C0
77D32137 8B7D 0C mov edi, dword ptr [ebp+C]
77D3213A 33DB xor ebx, ebx
77D3213C 3BFB cmp edi, ebx
77D3213E 0F84 398F0000 je 77D3B07D
77D32144 395D 10 cmp dword ptr [ebp+10], ebx
77D32147 0F84 308F0000 je 77D3B07D
77D3214D 895D FC mov dword ptr [ebp-4], ebx
77D32150 881F mov byte ptr [edi], bl
alt+f9返回
03384358 51 push ecx
03384359 68 2A230000 push 232A
0338435E 56 push esi
0338435F FFD7 call edi
03384361 8B1D 4C6A3803 mov ebx, dword ptr [3386A4C] ; USER32.GetWindowTextA
03384367 50 push eax
03384368 FFD3 call ebx
0338436A 6A 3F push 3F 返回到此
0338436C 8D5424 55 lea edx, dword ptr [esp+55]
03384370 6A 00 push 0
03384372 52 push edx
03384373 C64424 5C 00 mov byte ptr [esp+5C], 0
03384378 E8 1311FFFF call 03375490
0338437D 83C4 0C add esp, 0C
03384380 6A 40 push 40
03384382 8D4424 54 lea eax, dword ptr [esp+54]
03384386 50 push eax
03384387 68 2D230000 push 232D
0338438C 56 push esi
0338438D FFD7 call edi
0338438F 50 push eax
03384390 FFD3 call ebx
03384392 8D4C24 50 lea ecx, dword ptr [esp+50]
03384396 51 push ecx
03384397 8B0D F4C43803 mov ecx, dword ptr [338C4F4]
0338439D 8D5424 14 lea edx, dword ptr [esp+14]
033843A1 52 push edx
033843A2 E8 69FDFFFF call 03384110 关键call ,这里也不能用标志位修改
033843A7 85C0 test eax, eax eax=1就不跳转
033843A9 74 21 je short 033843CC 不跳转就失败,不知为何不能爆破修改为jmp
033843AB 6A 10 push 10
033843AD 68 90A73803 push 338A790
033843B2 68 1CA83803 push 338A81C
033843B7 56 push esi
033843B8 FF15 606A3803 call dword ptr [3386A60] ; USER32.MessageBoxA
033843BE 33C0 xor eax, eax
033843C0 5F pop edi
033843C1 5E pop esi
033843C2 5B pop ebx
033843C3 81C4 90010000 add esp, 190
033843C9 C2 1000 retn 10
033843CC 6A 40 push 40
033843CE 68 F0A73803 push 338A7F0
033843D3 68 F8A73803 push 338A7F8
033843D8 56 push esi
033843D9 FF15 606A3803 call dword ptr [3386A60] ; USER32.MessageBoxA
033843DF 6A 01 push 1
033843E1 56 push esi
033843E2 FF15 386A3803 call dword ptr [3386A38] ; USER32.EndDialog
033843E8 33C0 xor eax, eax
033843EA 5F pop edi
033843EB 5E pop esi
033843EC 5B pop ebx
033843ED 81C4 90010000 add esp, 190
F7进入 0033843A2 看到的,就是一直跳转,头都晕了,经过整理后得到
03397175 83EC 70 sub esp, 70
03393230 55 push ebp
033903BA 8BE9 mov ebp, ecx
033980CA 8A45 10 mov al, byte ptr [ebp+10]
0339EA5F 3C 01 cmp al, 1
03395C52 56 push esi
0339E061 57 push edi ; USER32.GetDlgItem
03392095 /0F84 6CAD0000 je 0339CE07 未实现
033922C9 3C 02 cmp al, 2
03397BED /0F85 CE5D0000 jnz 0339D9C1 未实现
0339CE07 8B8424 84000000 mov eax, dword ptr [esp+84]
0339D082 8038 00 cmp byte ptr [eax], 0
0339A0E3 ^\0F84 8F60FFFF je 03390178 未实现
0339D9C1 8BBC24 80000000 mov edi, dword ptr [esp+80]
12FB-3512-731A-DBE0-A3FA-A42D-AA91-A77C
getwindowstexta 断下
77D3212B > 6A 0C push 0C
77D3212D 68 9021D377 push 77D32190
77D32132 E8 8964FEFF call 77D185C0
77D32137 8B7D 0C mov edi, dword ptr [ebp+C]
77D3213A 33DB xor ebx, ebx
77D3213C 3BFB cmp edi, ebx
77D3213E 0F84 398F0000 je 77D3B07D
77D32144 395D 10 cmp dword ptr [ebp+10], ebx
77D32147 0F84 308F0000 je 77D3B07D
77D3214D 895D FC mov dword ptr [ebp-4], ebx
77D32150 881F mov byte ptr [edi], bl
alt+f9返回
03384358 51 push ecx
03384359 68 2A230000 push 232A
0338435E 56 push esi
0338435F FFD7 call edi
03384361 8B1D 4C6A3803 mov ebx, dword ptr [3386A4C] ; USER32.GetWindowTextA
03384367 50 push eax
03384368 FFD3 call ebx
0338436A 6A 3F push 3F 返回到此
0338436C 8D5424 55 lea edx, dword ptr [esp+55]
03384370 6A 00 push 0
03384372 52 push edx
03384373 C64424 5C 00 mov byte ptr [esp+5C], 0
03384378 E8 1311FFFF call 03375490
0338437D 83C4 0C add esp, 0C
03384380 6A 40 push 40
03384382 8D4424 54 lea eax, dword ptr [esp+54]
03384386 50 push eax
03384387 68 2D230000 push 232D
0338438C 56 push esi
0338438D FFD7 call edi
0338438F 50 push eax
03384390 FFD3 call ebx
03384392 8D4C24 50 lea ecx, dword ptr [esp+50]
03384396 51 push ecx
03384397 8B0D F4C43803 mov ecx, dword ptr [338C4F4]
0338439D 8D5424 14 lea edx, dword ptr [esp+14]
033843A1 52 push edx
033843A2 E8 69FDFFFF call 03384110 关键call ,这里也不能用标志位修改
033843A7 85C0 test eax, eax eax=1就不跳转
033843A9 74 21 je short 033843CC 不跳转就失败,不知为何不能爆破修改为jmp
033843AB 6A 10 push 10
033843AD 68 90A73803 push 338A790
033843B2 68 1CA83803 push 338A81C
033843B7 56 push esi
033843B8 FF15 606A3803 call dword ptr [3386A60] ; USER32.MessageBoxA
033843BE 33C0 xor eax, eax
033843C0 5F pop edi
033843C1 5E pop esi
033843C2 5B pop ebx
033843C3 81C4 90010000 add esp, 190
033843C9 C2 1000 retn 10
033843CC 6A 40 push 40
033843CE 68 F0A73803 push 338A7F0
033843D3 68 F8A73803 push 338A7F8
033843D8 56 push esi
033843D9 FF15 606A3803 call dword ptr [3386A60] ; USER32.MessageBoxA
033843DF 6A 01 push 1
033843E1 56 push esi
033843E2 FF15 386A3803 call dword ptr [3386A38] ; USER32.EndDialog
033843E8 33C0 xor eax, eax
033843EA 5F pop edi
033843EB 5E pop esi
033843EC 5B pop ebx
033843ED 81C4 90010000 add esp, 190
F7进入 0033843A2 看到的,就是一直跳转,头都晕了,经过整理后得到
03397175 83EC 70 sub esp, 70
03393230 55 push ebp
033903BA 8BE9 mov ebp, ecx
033980CA 8A45 10 mov al, byte ptr [ebp+10]
0339EA5F 3C 01 cmp al, 1
03395C52 56 push esi
0339E061 57 push edi ; USER32.GetDlgItem
03392095 /0F84 6CAD0000 je 0339CE07 未实现
033922C9 3C 02 cmp al, 2
03397BED /0F85 CE5D0000 jnz 0339D9C1 未实现
0339CE07 8B8424 84000000 mov eax, dword ptr [esp+84]
0339D082 8038 00 cmp byte ptr [eax], 0
0339A0E3 ^\0F84 8F60FFFF je 03390178 未实现
0339D9C1 8BBC24 80000000 mov edi, dword ptr [esp+80]
0339192F ^\0F84 43E8FFFF je 03390178 未实现
0339CB98 8BC7 mov eax, edi
03396C65 8D50 01 lea edx, dword ptr [eax+1]
0339D251 8A08 mov cl, byte ptr [eax] 逐位取取假注册码ASCII入CL
0339B53A 83C0 01 add eax, 1
0339EAA0 84C9 test cl, cl
0339EEFA ^\0F85 51E3FFFF jnz 0339D251 实现
0339D251 8A08 mov cl, byte ptr [eax]
0339B53A 83C0 01 add eax, 1
0339EAA0 84C9 test cl, cl
0339EEFA ^\0F85 51E3FFFF jnz 0339D251 实现
0339D251 8A08 mov cl, byte ptr [eax]
0339B53A 83C0 01 add eax, 1
0339EAA0 84C9 test cl, cl
0339EEFA ^\0F85 51E3FFFF jnz 0339D251 实现
0339D251 8A08 mov cl, byte ptr [eax]
0339B53A 83C0 01 add eax, 1
0339EAA0 84C9 test cl, cl
0339EEFA ^\0F85 51E3FFFF jnz 0339D251 实现
0339D251 8A08 mov cl, byte ptr [eax]
0339B53A 83C0 01 add eax, 1
0339EAA0 84C9 test cl, cl
0339EEFA ^\0F85 51E3FFFF jnz 0339D251 未实现
0339EA6A 2BC2 sub eax, edx
033959CA 83F8 3C cmp eax, 3C
0339C8C9 ^\0F87 A938FFFF ja 03390178 未实现
03397C6C 6A 3F push 3F
03391CC4 884C24 3C mov byte ptr [esp+3C], cl
03398842 8D4C24 3D lea ecx, dword ptr [esp+3D]
03397B09 6A 00 push 0
03398B55 51 push ecx
0339E555 E8 02000000 call 0339E55C 错误注册窗口 |
|