- UID
- 28352
注册时间2007-2-21
阅读权限40
最后登录1970-1-1
独步武林
TA的每日心情 | 开心 2024-5-1 14:44 |
---|
签到天数: 2 天 [LV.1]初来乍到
|
发表于 2008-1-5 14:11:03
|
显示全部楼层
********************************************************************************
一、运行程序,进行注册,输入错误的注册信息进行检测,有提示信息
"注册完成,请重新运行程序!"
********************************************************************************
二、用PEiD对这个软件查壳,为 ASPack 2.12 -> Alexey Solodovnikov,
用PEiD插件脱壳,查壳,为 Borland Delphi 6.0 - 7.0
********************************************************************************
三、运行OD,打开FileBackup.exe.unpacked_,右键—超级字串参考—查找ASCII.
发现"注册完成,请重新运行程序!"
00523A84 /. 55 PUSH EBP
00523A85 |. 8BEC MOV EBP,ESP
00523A87 |. 6A 00 PUSH 0
00523A89 |. 6A 00 PUSH 0
00523A8B |. 53 PUSH EBX
00523A8C |. 56 PUSH ESI
00523A8D |. 8BF0 MOV ESI,EAX
00523A8F |. 33C0 XOR EAX,EAX
00523A91 |. 55 PUSH EBP
00523A92 |. 68 453B5200 PUSH FileBack.00523B45
00523A97 |. 64:FF30 PUSH DWORD PTR FS:[EAX]
00523A9A |. 64:8920 MOV DWORD PTR FS:[EAX],ESP
00523A9D |. B2 01 MOV DL,1
00523A9F |. A1 DCBA4900 MOV EAX,DWORD PTR DS:[49BADC]
00523AA4 |. E8 9F81F7FF CALL FileBack.0049BC48
00523AA9 |. 8BD8 MOV EBX,EAX
00523AAB |. BA 01000080 MOV EDX,80000001
00523AB0 |. 8BC3 MOV EAX,EBX
00523AB2 |. E8 6D82F7FF CALL FileBack.0049BD24
00523AB7 |. B1 01 MOV CL,1
00523AB9 |. BA 5C3B5200 MOV EDX,FileBack.00523B5C ; software\filebackup
00523ABE |. 8BC3 MOV EAX,EBX ; //注册信息保存在Software\FileBackup
00523AC0 |. E8 A383F7FF CALL FileBack.0049BE68
00523AC5 |. 8D55 FC LEA EDX,DWORD PTR SS:[EBP-4]
00523AC8 |. 8B86 38030000 MOV EAX,DWORD PTR DS:[ESI+338]
00523ACE |. E8 2545F2FF CALL FileBack.00447FF8 ; //将用户名长度送入EAX
00523AD3 |. 8B4D FC MOV ECX,DWORD PTR SS:[EBP-4] ; //将用户名送入ECX
00523AD6 |. BA 783B5200 MOV EDX,FileBack.00523B78 ; reguser
00523ADB |. 8BC3 MOV EAX,EBX ; //将RegUser送入EDX
00523ADD |. E8 2287F7FF CALL FileBack.0049C204
00523AE2 |. 8D55 F8 LEA EDX,DWORD PTR SS:[EBP-8]
00523AE5 |. 8B86 3C030000 MOV EAX,DWORD PTR DS:[ESI+33C]
00523AEB |. E8 0845F2FF CALL FileBack.00447FF8 ; //将试练码长度送入EAX
00523AF0 |. 8B4D F8 MOV ECX,DWORD PTR SS:[EBP-8] ; //将试练码送入ECX
00523AF3 |. BA 883B5200 MOV EDX,FileBack.00523B88 ; regno
00523AF8 |. 8BC3 MOV EAX,EBX ; //将RegNo送入EDX
00523AFA |. E8 0587F7FF CALL FileBack.0049C204
00523AFF |. 8BC3 MOV EAX,EBX
00523B01 |. E8 CEFEEDFF CALL FileBack.004039D4
00523B06 |. 6A 40 PUSH 40
00523B08 |. B9 903B5200 MOV ECX,FileBack.00523B90 ; 提示
00523B0D |. BA 983B5200 MOV EDX,FileBack.00523B98 ; 注册完成,请重新运行程序!
00523B12 |. A1 64A15200 MOV EAX,DWORD PTR DS:[52A164]
00523B17 |. 8B00 MOV EAX,DWORD PTR DS:[EAX]
00523B19 |. E8 BE56F4FF CALL FileBack.004691DC ; //弹出对话框
00523B1E |. A1 64A15200 MOV EAX,DWORD PTR DS:[52A164]
00523B23 |. 8B00 MOV EAX,DWORD PTR DS:[EAX]
00523B25 |. E8 0E56F4FF CALL FileBack.00469138
00523B2A |. 33C0 XOR EAX,EAX
00523B2C |. 5A POP EDX
00523B2D |. 59 POP ECX
00523B2E |. 59 POP ECX
00523B2F |. 64:8910 MOV DWORD PTR FS:[EAX],EDX
00523B32 |. 68 4C3B5200 PUSH FileBack.00523B4C
00523B37 |> 8D45 F8 LEA EAX,DWORD PTR SS:[EBP-8]
00523B3A |. BA 02000000 MOV EDX,2
00523B3F |. E8 A40DEEFF CALL FileBack.004048E8
00523B44 \. C3 RETN
00523B45 .^ E9 1E06EEFF JMP FileBack.00404168
00523B4A .^ EB EB JMP SHORT FileBack.00523B37
00523B4C . 5E POP ESI
00523B4D . 5B POP EBX
00523B4E . 59 POP ECX
00523B4F . 59 POP ECX
00523B50 . 5D POP EBP
00523B51 . C3 RETN
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
注册信息保存在
[HKEY_USERS\S-1-5-21-463895000-2320687865-3845484338-500\Software\FileBackup]
"RegUser"和"RegNo"
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
00523AF3 |. BA 883B5200 MOV EDX,FileBack.00523B88 ; regno //注册用
005262C3 |. BA 98635200 MOV EDX,FileBack.00526398 ; regno //验证用
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
00526258 /. 55 PUSH EBP
00526259 |. 8BEC MOV EBP,ESP
0052625B |. 33C9 XOR ECX,ECX
0052625D |. 51 PUSH ECX
0052625E |. 51 PUSH ECX
0052625F |. 51 PUSH ECX
00526260 |. 51 PUSH ECX
00526261 |. 53 PUSH EBX
00526262 |. 33C0 XOR EAX,EAX
00526264 |. 55 PUSH EBP
00526265 |. 68 56635200 PUSH FileBack.00526356
0052626A |. 64:FF30 PUSH DWORD PTR FS:[EAX]
0052626D |. 64:8920 MOV DWORD PTR FS:[EAX],ESP
00526270 |. E8 4BE0FFFF CALL FileBack.005242C0
00526275 |. C605 D4C35200>MOV BYTE PTR DS:[52C3D4],0
0052627C |. B2 01 MOV DL,1
0052627E |. A1 DCBA4900 MOV EAX,DWORD PTR DS:[49BADC]
00526283 |. E8 C059F7FF CALL FileBack.0049BC48
00526288 |. 8BD8 MOV EBX,EAX
0052628A |. BA 01000080 MOV EDX,80000001
0052628F |. 8BC3 MOV EAX,EBX
00526291 |. E8 8E5AF7FF CALL FileBack.0049BD24
00526296 |. B1 01 MOV CL,1
00526298 |. BA 6C635200 MOV EDX,FileBack.0052636C ; software\filebackup
0052629D |. 8BC3 MOV EAX,EBX
0052629F |. E8 C45BF7FF CALL FileBack.0049BE68
005262A4 |. 8D4D FC LEA ECX,DWORD PTR SS:[EBP-4]
005262A7 |. BA 88635200 MOV EDX,FileBack.00526388 ; reguser
005262AC |. 8BC3 MOV EAX,EBX
005262AE |. E8 7D5FF7FF CALL FileBack.0049C230
005262B3 |. 8B55 FC MOV EDX,DWORD PTR SS:[EBP-4] ; //将用户名送入EDX
005262B6 |. B8 D8C35200 MOV EAX,FileBack.0052C3D8
005262BB |. E8 58E6EDFF CALL FileBack.00404918
005262C0 |. 8D4D F8 LEA ECX,DWORD PTR SS:[EBP-8]
005262C3 |. BA 98635200 MOV EDX,FileBack.00526398 ; regno
005262C8 |. 8BC3 MOV EAX,EBX
005262CA |. E8 615FF7FF CALL FileBack.0049C230
005262CF |. 8B45 F8 MOV EAX,DWORD PTR SS:[EBP-8] ; //将试练码送入EAX
005262D2 |. 50 PUSH EAX ; //将试练码压栈
005262D3 |. 8D4D F4 LEA ECX,DWORD PTR SS:[EBP-C]
005262D6 |. BA A8635200 MOV EDX,FileBack.005263A8 ; filebackupchina
005262DB |. A1 D8C35200 MOV EAX,DWORD PTR DS:[52C3D8] ; //将filebackupChina送入EDX
005262E0 |. E8 0BA3FDFF CALL FileBack.005005F0 ; //算法CALL
005262E5 |. 8B55 F4 MOV EDX,DWORD PTR SS:[EBP-C] ; //将真码送入EDX
005262E8 |. 58 POP EAX ; //将试练码出栈
005262E9 |. E8 D2E9EDFF CALL FileBack.00404CC0 ; //比较CALL
005262EE |. 75 07 JNZ SHORT FileBack.005262F7 ; //关键跳转
005262F0 |. C605 D4C35200>MOV BYTE PTR DS:[52C3D4],1
005262F7 |> 8BC3 MOV EAX,EBX
005262F9 |. E8 D6D6EDFF CALL FileBack.004039D4
005262FE |. 803D D4C35200>CMP BYTE PTR DS:[52C3D4],0
00526305 |. 75 27 JNZ SHORT FileBack.0052632E
00526307 |. 8D55 F0 LEA EDX,DWORD PTR SS:[EBP-10]
0052630A |. A1 D0C35200 MOV EAX,DWORD PTR DS:[52C3D0]
0052630F |. E8 E41CF2FF CALL FileBack.00447FF8
00526314 |. 8D45 F0 LEA EAX,DWORD PTR SS:[EBP-10]
00526317 |. BA C0635200 MOV EDX,FileBack.005263C0 ; - 未购买用户
0052631C |. E8 63E8EDFF CALL FileBack.00404B84
00526321 |. 8B55 F0 MOV EDX,DWORD PTR SS:[EBP-10]
00526324 |. A1 D0C35200 MOV EAX,DWORD PTR DS:[52C3D0]
00526329 |. E8 FA1CF2FF CALL FileBack.00448028
0052632E |> E8 A9EAFFFF CALL FileBack.00524DDC
00526333 |. 33C0 XOR EAX,EAX
00526335 |. 5A POP EDX
00526336 |. 59 POP ECX
00526337 |. 59 POP ECX
00526338 |. 64:8910 MOV DWORD PTR FS:[EAX],EDX
0052633B |. 68 5D635200 PUSH FileBack.0052635D
00526340 |> 8D45 F0 LEA EAX,DWORD PTR SS:[EBP-10]
00526343 |. E8 7CE5EDFF CALL FileBack.004048C4
00526348 |. 8D45 F4 LEA EAX,DWORD PTR SS:[EBP-C]
0052634B |. BA 03000000 MOV EDX,3
00526350 |. E8 93E5EDFF CALL FileBack.004048E8
00526355 \. C3 RETN
00526356 .^ E9 0DDEEDFF JMP FileBack.00404168
0052635B .^ EB E3 JMP SHORT FileBack.00526340
0052635D . 5B POP EBX
0052635E . 8BE5 MOV ESP,EBP
00526360 . 5D POP EBP
00526361 . C3 RETN
********************************************************************************
【破解总结】
--------------------------------------------------------------------------------
【内存注册机】
中断地址 5262E9
中断次数 1
第一字节 E8
指令长度 5
内存方式-寄存器-EDX
--------------------------------------------------------------------------------
【爆破地址】
005262EE |. 75 07 JNZ SHORT FileBack.005262F7
NOP掉
--------------------------------------------------------------------------------
【注册信息】
用户名:abcdef
注册码:186628E6455FDDAB
--------------------------------------------------------------------------------
希望以后可以在猫老大和PYG 5.4Cracker学习小组的帮助下进一步提高自己。
感谢飘云老大、猫老大、Nisy老大以及很多前辈们的学习教程以及所有帮助过我的论坛兄弟姐妹们!谢谢
--------------------------------------------------------------------------------
【版权声明】破文是学习的手记,兴趣是成功的源泉;本破文纯属技术交流, 转载请注明作者并保持文章的完整, 谢谢! |
|