Internet Maniac ver 1.2b 破解過程(適合初學者) (7千字)
Internet Maniac ver 1.2b Released: Sept.15, 1999
簡介:
追蹤:name:dahuilang
RN:01234567
今天應網友的要求,破解這個軟體。現在我也是很少再破解軟體了。畢竟沒有時間了,所以今天拿來這個軟體破解時感覺它不是很難,破解以後發現它的確不難。破解過程如下:使用bpx
hmemcpy後攔下來
* Reference To: USER32.GetDlgItemTextA, Ord:0104h
|
:00405183 8B3DE8114100 mov edi, dword
ptr [004111E8]
:00405189 8D442448 lea
eax, dword ptr [esp+48]
:0040518D 6800010000 push 00000100
:00405192 50
push eax
* Possible Reference to Dialog: DialogID_007C, CONTROL_ID:044A, ""
|
:00405193 684A040000 push 0000044A
:00405198 56
push esi
:00405199 FFD7
call edi
:0040519B 8D4C2408 lea
ecx, dword ptr [esp+08] <-從系統出來
:0040519F 6800010000 push 00000100
:004051A4 51
push ecx
* Possible Reference to Dialog: DialogID_007C, CONTROL_ID:0449, ""
|
:004051A5 6849040000 push 00000449
:004051AA 56
push esi
:004051AB FFD7
call edi
:004051AD 8D542448 lea
edx, dword ptr [esp+48]
:004051B1 8D442408 lea
eax, dword ptr [esp+08]
:004051B5 52
push edx
:004051B6 50
push eax
:004051B7 E8142E0000 call 00407FD0
:004051BC 83C408
add esp, 00000008
:004051BF 85C0
test eax, eax
:004051C1 744A
je 0040520D
* Reference To: KERNEL32.WritePrivateProfileStringA, Ord:02E5h
|
:004051C3 8B3D28104100 mov edi, dword
ptr [00411028]
:004051C9 8D4C2408 lea
ecx, dword ptr [esp+08]
:004051CD 68A0004300 push 004300A0
:004051D2 51
push ecx
* Possible StringData Ref from Data Obj ->"User Name"
|
:004051D3 6824344100 push 00413424
* Possible StringData Ref from Data Obj ->"Internet Maniac"
|
:004051D8 6884314100 push 00413184
:004051DD FFD7
call edi
:004051DF 8D542448 lea
edx, dword ptr [esp+48]
:004051E3 68A0004300 push 004300A0
:004051E8 52
push edx
* Possible StringData Ref from Data Obj ->"Registration Code"
|
:004051E9 6838344100 push 00413438
* Possible StringData Ref from Data Obj ->"Internet Maniac"
|
:004051EE 6884314100 push 00413184
:004051F3 FFD7
call edi
:004051F5 6A40
push 00000040
* Possible StringData Ref from Data Obj ->"Registration Successful"
|
:004051F7 6804364100 push 00413604
* Possible StringData Ref from Data Obj ->"Thank you for registering Internet
"
->"Maniac. Enjoy
the program."
|
:004051FC 68C4354100 push 004135C4
:00405201 56
push esi
* Reference To: USER32.MessageBoxA, Ord:01BEh
|
:00405202 FF1554114100 Call dword ptr
[00411154]
:00405208 6A01
push 00000001
:0040520A 56
push esi
:0040520B EB39
jmp 00405246
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004051C1(C)
|
:0040520D 6A10
push 00000010
* Possible StringData Ref from Data Obj ->"Failure!"
|
:0040520F 68B8354100 push 004135B8
* Possible StringData Ref from Data Obj ->"Incorrect registration code!"
|
:00405214 6898354100 push 00413598
:00405219 56
push esi
* Reference To: USER32.MessageBoxA, Ord:01BEh
|
:0040521A FF1554114100 Call dword ptr
[00411154]
:00405220 5F
pop edi
:00405221 B801000000 mov eax,
00000001
:00405226 5E
pop esi
:00405227 81C480000000 add esp, 00000080
:0040522D C21000
ret 0010
大家可以先看一看上面的程式碼,你可以先看到從call edi出來,你可以發現這個edi值就為USER32.GetDlgItemTextA我想這個函式大家一定熟悉吧,就是得到你輸入的name和RN,那麼現在它應使用兩次這樣的函式,所以在它的下面就還有一個call,這就說明程式的確讀取了兩次資料。現在向下看你可以發現關鍵的比較地方,這個我在初學天地中介紹過的關鍵比較形式。大家不知道記住沒有,如果記住的話,在這裡就應用上了。因為下面是正確的資訊和錯誤的資訊,所以就進入call
00407FD0中。
:00407FD0 83EC20
sub esp, 00000020
:00407FD3 56
push esi
:00407FD4 8B742428 mov
esi, dword ptr [esp+28]
:00407FD8 56
push esi name
* Reference To: KERNEL32.lstrlenA, Ord:0308h
|
:00407FD9 FF1560104100 Call dword ptr
[00411060]
:00407FDF 83F804
cmp eax, 00000004
:00407FE2 7D07
jge 00407FEB
這裡當然是比較你的name個數是否小於4,如果不是話,進行下面的比較。
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00407FE2(C)
|
:00407FEB 0FBE4601 movsx
eax, byte ptr [esi+01]
:00407FEF 0FBE4E02 movsx
ecx, byte ptr [esi+02]
:00407FF3 D1E0
shl eax, 1
:00407FF5 50
push eax
:00407FF6 0FBE4603 movsx
eax, byte ptr [esi+03]
:00407FFA C1E102
shl ecx, 02
:00407FFD 51
push ecx
:00407FFE B90A000000 mov ecx,
0000000A
:00408003 99
cdq
:00408004 F7F9
idiv ecx
:00408006 B8A0C634FA mov eax,
FA34C6A0
:0040800B 8BCA
mov ecx, edx
:0040800D D3E0
shl eax, cl
:0040800F 8D4C240C lea
ecx, dword ptr [esp+0C]
:00408013 50
push eax
* Possible StringData Ref from Data Obj ->"%010u-%d%d"
|
:00408014 68383B4100 push 00413B38
:00408019 51
push ecx
* Reference To: USER32.wsprintfA, Ord:02ACh
|
:0040801A FF1544114100 Call dword ptr
[00411144]
:00408020 8B542440 mov
edx, dword ptr [esp+40]
:00408024 83C414
add esp, 00000014
:00408027 8D442404 lea
eax, dword ptr [esp+04]
:0040802B 52
push edx
:0040802C 50
push eax
* Reference To: KERNEL32.lstrcmpA, Ord:02FCh
|
:0040802D FF1544104100 Call dword ptr
[00411044]
:00408033 F7D8
neg eax
:00408035 1BC0
sbb eax, eax
:00408037 5E
pop esi
:00408038 40
inc eax
:00408039 83C420
add esp, 00000020
:0040803C C3
ret
在這裡你可以 看到計算註冊碼的過程,如果這個程式你想製作序號產生器的話,分析一下上面的地方就可以了。註冊碼可以在
:0040802B 52
push edx
:0040802C 50
push eax
這裡看到。我的註冊碼如下:
********************************
* name:dahuilang
*
* RN:0442716160-416194
*
********************************
相關文章
- 初學者(7) (4千字)2000-05-05
- 初學者(22) (7千字)2000-08-09
- 初學者(23) (7千字)2000-08-13
- 人事資訊綜合管理系統 Ver3.2 (完全版本)的破解過程 (7千字)2002-01-20
- 飛馬魔法桌布V3.0註冊演算法(適合初學者) (7千字)2001-11-25演算法
- 小小助手V2.01的破解過程-----算是我留給初學者的一偏破文
(7千字)2015-11-15
- Python適合初學者學習嗎?2020-04-22Python
- 適合ionic初學者的小專案2019-03-03
- 適合Angular初學者的小專案2018-01-30Angular
- 一篇破解教程-----面向初學者 (15千字)2001-04-01
- (適合初學者)下一個更大元素2020-10-05
- 初學者轉行學Python合適還是C語言合適?2021-12-21PythonC語言
- asmstudio5.0完全完美破解版的誕生過程(和初學者共同學習!) (1千字)2001-05-02ASM
- 破解badcat21---真正的初學者 (5千字)2001-05-19
- 哪種程式語言適合初學者學習2019-03-26
- PHP檔案及執行(適合PHP初學者)2020-12-29PHP
- 最適合初學者的語言是什麼?2016-06-13
- 獻給初學者(高手也看看) 破解 Cpukiller 2.0 (1千字)2000-09-17
- 最適合於初學者的 Linux 發行版2019-07-25Linux
- 適合初學者的java書籍,一定要碼2021-10-11Java
- Java最最基礎的知識(適合初學者看)2017-04-23Java
- 初學者請進(一篇破解javagirl的心得) (2千字)2000-05-09Java
- 瘋狂單詞破解實錄(初學者請進!) (9千字)2000-08-24
- 初學者(8) (4千字)2000-05-07
- 初學者(9) (3千字)2000-05-07
- 初學者(10) (8千字)2000-05-14
- 初學者(11) (2千字)2000-05-18
- 初學者(12) (1千字)2000-06-09
- 初學者(13) (2千字)2000-06-09
- 初學者(14) (5千字)2000-06-10
- 初學者(15) (3千字)2000-07-04
- 初學者(16) (2千字)2000-07-04
- 初學者(17) (1千字)2000-07-04
- 初學者(18) (2千字)2000-07-05
- 初學者(19) (4千字)2000-07-10
- 初學者(20) (3千字)2000-07-15
- 初學者(20) (1千字)2000-08-08
- 初學者(26) (9千字)2000-08-17