TA的每日心情 | 开心 2018-10-30 22:05 |
---|
签到天数: 6 天 [LV.2]偶尔看看I
|
发表于 2008-5-15 15:49:14
|
显示全部楼层
不知道你这个视频是用老版加密的还是新版加密的,老版的很容易就可以跟出加密的密钥;
新版只能跟出密钥的MD5值。。
我以新版的为例子:
输入假码,出现错误提示后暂停,看堆栈窗口,第10个返回到程序的地方反汇编跟随可以来到算法的核心地方:
0047FB38 55 push ebp
0047FB39 8BEC mov ebp,esp
0047FB3B B9 48000000 mov ecx,48
0047FB40 6A 00 push 0
0047FB42 6A 00 push 0
0047FB44 49 dec ecx
0047FB45 ^ 75 F9 jnz short 破解阿达.0047FB40
0047FB47 51 push ecx
0047FB48 53 push ebx
0047FB49 8BD8 mov ebx,eax
0047FB4B 33C0 xor eax,eax
0047FB4D 55 push ebp
0047FB4E 68 34FF4700 push 破解阿达.0047FF34
0047FB53 64:FF30 push dword ptr fs:[eax]
0047FB56 64:8920 mov dword ptr fs:[eax],esp
0047FB59 8D95 18FEFFFF lea edx,dword ptr ss:[ebp-1E8]
0047FB5F 8B83 00030000 mov eax,dword ptr ds:[ebx+300]
0047FB65 E8 C2EAFBFF call 破解阿达.0043E62C
0047FB6A 8B85 18FEFFFF mov eax,dword ptr ss:[ebp-1E8]
0047FB70 8D95 1CFEFFFF lea edx,dword ptr ss:[ebp-1E4]
0047FB76 E8 F18DF8FF call 破解阿达.0040896C
0047FB7B 8B85 1CFEFFFF mov eax,dword ptr ss:[ebp-1E4]
0047FB81 8D55 FC lea edx,dword ptr ss:[ebp-4]
0047FB84 E8 CF8BF8FF call 破解阿达.00408758
0047FB89 8D95 14FEFFFF lea edx,dword ptr ss:[ebp-1EC]
0047FB8F 8B83 FC020000 mov eax,dword ptr ds:[ebx+2FC]
0047FB95 E8 92EAFBFF call 破解阿达.0043E62C
0047FB9A 8B85 14FEFFFF mov eax,dword ptr ss:[ebp-1EC]
0047FBA0 BA 48FF4700 mov edx,破解阿达.0047FF48
0047FBA5 E8 0E50F8FF call 破解阿达.00404BB8
0047FBAA 75 33 jnz short 破解阿达.0047FBDF
0047FBAC 8D95 0CFEFFFF lea edx,dword ptr ss:[ebp-1F4]
0047FBB2 A1 64624800 mov eax,dword ptr ds:[486264]
0047FBB7 8B00 mov eax,dword ptr ds:[eax]
0047FBB9 E8 32220000 call 破解阿达.00481DF0
0047FBBE 8B85 0CFEFFFF mov eax,dword ptr ss:[ebp-1F4]
0047FBC4 8D95 10FEFFFF lea edx,dword ptr ss:[ebp-1F0]
0047FBCA E8 898BF8FF call 破解阿达.00408758
0047FBCF 8B85 10FEFFFF mov eax,dword ptr ss:[ebp-1F0]
0047FBD5 8D55 F8 lea edx,dword ptr ss:[ebp-8]
0047FBD8 E8 5F210000 call 破解阿达.00481D3C
0047FBDD EB 55 jmp short 破解阿达.0047FC34
0047FBDF 8D95 04FEFFFF lea edx,dword ptr ss:[ebp-1FC]
0047FBE5 A1 64624800 mov eax,dword ptr ds:[486264]
0047FBEA 8B00 mov eax,dword ptr ds:[eax] ; 关键地方
0047FBEC E8 FF210000 call 破解阿达.00481DF0
0047FBF1 8D85 04FEFFFF lea eax,dword ptr ss:[ebp-1FC]
0047FBF7 50 push eax
0047FBF8 8D95 00FEFFFF lea edx,dword ptr ss:[ebp-200]
0047FBFE 8B83 FC020000 mov eax,dword ptr ds:[ebx+2FC]
0047FC04 E8 23EAFBFF call 破解阿达.0043E62C
0047FC09 8B95 00FEFFFF mov edx,dword ptr ss:[ebp-200]
0047FC0F 58 pop eax
0047FC10 E8 5F4EF8FF call 破解阿达.00404A74
0047FC15 8B85 04FEFFFF mov eax,dword ptr ss:[ebp-1FC]
0047FC1B 8D95 08FEFFFF lea edx,dword ptr ss:[ebp-1F8]
0047FC21 E8 328BF8FF call 破解阿达.00408758
0047FC26 8B85 08FEFFFF mov eax,dword ptr ss:[ebp-1F8]
0047FC2C 8D55 F8 lea edx,dword ptr ss:[ebp-8]
0047FC2F E8 08210000 call 破解阿达.00481D3C
0047FC34 8D95 E4FDFFFF lea edx,dword ptr ss:[ebp-21C]
0047FC3A 8B45 F8 mov eax,dword ptr ss:[ebp-8]
0047FC3D E8 AE210000 call 破解阿达.00481DF0
0047FC42 8D85 E4FDFFFF lea eax,dword ptr ss:[ebp-21C]
0047FC48 BA 5CFF4700 mov edx,破解阿达.0047FF5C ; ASCII "yao1"
0047FC4D E8 224EF8FF call 破解阿达.00404A74
0047FC52 8B85 E4FDFFFF mov eax,dword ptr ss:[ebp-21C]
0047FC58 8D95 F0FDFFFF lea edx,dword ptr ss:[ebp-210]
0047FC5E E8 6968FEFF call 破解阿达.004664CC
0047FC63 8D85 F0FDFFFF lea eax,dword ptr ss:[ebp-210]
0047FC69 8D95 E8FDFFFF lea edx,dword ptr ss:[ebp-218]
0047FC6F E8 CC68FEFF call 破解阿达.00466540
0047FC74 8B85 E8FDFFFF mov eax,dword ptr ss:[ebp-218]
0047FC7A 8D8D ECFDFFFF lea ecx,dword ptr ss:[ebp-214]
0047FC80 BA 02000000 mov edx,2
0047FC85 E8 0209FBFF call 破解阿达.0043058C
0047FC8A 8B85 ECFDFFFF mov eax,dword ptr ss:[ebp-214]
0047FC90 8D95 F0FDFFFF lea edx,dword ptr ss:[ebp-210]
0047FC96 E8 3168FEFF call 破解阿达.004664CC
0047FC9B 8D85 F0FDFFFF lea eax,dword ptr ss:[ebp-210]
0047FCA1 8D55 F0 lea edx,dword ptr ss:[ebp-10]
0047FCA4 E8 9768FEFF call 破解阿达.00466540
0047FCA9 8D8D E0FDFFFF lea ecx,dword ptr ss:[ebp-220]
0047FCAF BA 02000000 mov edx,2
0047FCB4 8B45 FC mov eax,dword ptr ss:[ebp-4]
0047FCB7 E8 D008FBFF call 破解阿达.0043058C
0047FCBC 8B85 E0FDFFFF mov eax,dword ptr ss:[ebp-220]
0047FCC2 8D95 F0FDFFFF lea edx,dword ptr ss:[ebp-210]
0047FCC8 E8 FF67FEFF call 破解阿达.004664CC
0047FCCD 8D85 F0FDFFFF lea eax,dword ptr ss:[ebp-210]
0047FCD3 8D55 EC lea edx,dword ptr ss:[ebp-14]
0047FCD6 E8 6568FEFF call 破解阿达.00466540
这个算法我只看明白了注册码头6位,最后2位我看不懂是哪里出来的,所以我就不分析了。。
运行到上面我表示关键地方那里,这时EAX的值为1串64位的字符,将其修改为D4339335F105B471853BC135A05FE62AD3679662F056B27FD7309332AD5EB42D,即可将密钥修改为123456,自己再用软件算自己的注册码就行了。。。
不清楚那传字符的地址是不是固定的,我这里是在021c7ff8,如果是固定的就可以很容易写个固定密钥的补丁了。。
[ 本帖最后由 iamok 于 2008-5-15 16:58 编辑 ] |
|