Update NOW 2000 暴力破解方法! (8千字)
Update NOW 2000 暴力破解方法!
工具:trw2000 (搞破解人士必備物品,可以消痛止血、健脾、化痰.....)
IDA (巨酷的軟體,高手必備)
HIEW (不用他改位元組用什麼?)
步驟一:先下載Update NOW 2000 (@#$@%$&^%)
步驟二:先用W32dsm反編譯,結果出錯!(@#$@%$&^%)
步驟三:知道他防W32dsm,那麼我們的IDA就要上場了!!用IDA反編譯!(使用方法到看雪那裡找)
步驟四:在註冊處隨便輸入幾個字元提示謝謝(這也要謝?)發現他寫到windows/update.ini裡面
NAME=xxxxx
SERIAL=xxxxx
那麼根據福爾莫斯理論,我們已經找到關鍵的線索的在IDA下找著SERIAL字串(最好加上那個找字串的外掛),
會找到好幾個,
但是關鍵在這裡
004356FD push
offset aName ; "NAME"
00435702 lea
edx, [esp+278h+var_258]
00435706 push
offset aOption ; "OPTION"
0043570B push
edx
0043570C mov
ecx, eax
0043570E call
sub_48716A
00435713 push
eax
00435714 lea
ecx, [esp+274h+var_250]
00435718 mov
byte ptr [esp+274h+var_4], 5
00435720 call
sub_470D4D
00435725 lea
ecx, [esp+270h+var_258]
00435729 mov
byte ptr [esp+270h+var_4], 3
00435731 call
sub_470C14
00435736 mov
eax, [esp+270h+var_250]
0043573A cmp
[eax-8], esi
0043573D jz
loc_4358D5
00435743 push
offset aRegister ; "register" --------黑名單!
00435748 push
eax
00435749 call
__strcmpi
0043574E add
esp, 8
00435751 cmp
eax, esi
00435753 jz
loc_4358D5
00435759 mov
eax, [esp+270h+var_250]
0043575D push
offset aHanliner ; "hanliner" --------黑名單!
00435762 push
eax
00435763 call
__strcmpi
00435768 add
esp, 8
0043576B cmp
eax, esi
0043576D jz
loc_4358D5
00435773 mov
ecx, [esp+270h+var_250]
00435777 push
offset aOpq98 ; "opq98" --------黑名單!(這個知道是誰吧,哈哈!)
0043577C push
ecx
0043577D call
__strcmpi
00435782 add
esp, 8
00435785 cmp
eax, esi
00435787 jz
loc_4358D5
0043578D mov
edx, [esp+270h+var_250]
00435791 push
offset aWenling ; "wenling"
00435796 push
edx
00435797 call
__strcmpi
0043579C add
esp, 8
0043579F cmp
eax, esi
004357A1 jz
loc_4358D5
004357A7 push
6
004357A9 push
offset aWww_pcchina_ne ; "www.pcchina.net"
004357AE lea
eax, [esp+278h+var_18C]
004357B5 push
0FFFFFFC7h
004357B7 push
eax
004357B8 lea
ecx, [esp+280h+var_250]
004357BC call
sub_401800
004357C1 push
ecx
004357C2 mov
ecx, esp
004357C4 mov
[esp+284h+var_260], esp
004357C8 push
eax
004357C9 call
sub_470C82
004357CE mov
ecx, ebp
004357D0 call
sub_43B100
004357D5 call
?AfxGetModuleState@@YGPAVAFX_MODULE_STATE@@XZ ; AfxGetModuleState(void)
004357DA mov
eax, [eax+4]
004357DD push
esi
004357DE push
offset aSerial ; "SERIAL"
-------開始啟動的時候檢驗這裡!
004357E3 lea
ecx, [esp+278h+var_258]
004357E7 push
offset aOption ; "OPTION"
004357EC push
ecx
004357ED mov
ecx, eax
004357EF call
sub_48716A
004357F4 push
eax
004357F5 lea
ecx, [esp+274h+var_254]
004357F9 mov
byte ptr [esp+274h+var_4], 6
00435801 call
sub_470D4D
00435806 lea
ecx, [esp+270h+var_258]
0043580A mov
byte ptr [esp+270h+var_4], 3
00435812 call
sub_470C14
00435817 lea
edi, [esp+270h+var_18C]
0043581E or
ecx, 0FFFFFFFFh
00435821 xor
eax, eax
00435823 repne scasb
00435825 not
ecx
00435827 dec
ecx
00435828 lea
edi, [esp+270h+var_10C]
0043582F mov
edx, ecx
00435831 or
ecx, 0FFFFFFFFh
00435834 repne scasb
00435836 not
ecx
00435838 dec
ecx
00435839 cmp
ecx, edx
0043583B jz
short loc_43586D --------程式啟動的時候這裡條轉往下可是一
0043583D
會兒程式又會條到會到下面!
0043583D loc_43583D:
; CODE XREF: sub_435550+36Bj
-----又跳到這裡!透過trw跟蹤發現問題!
0043583D lea
edi, [ebp+2D50h]
00435843 push
esi
00435844 push
0B1h
00435849 mov
ecx, edi
0043584B call
sub_46BE10
00435850 test
eax, eax
00435852 jz
loc_4367F1
00435858 push
5
0043585A mov
ecx, edi
0043585C call
sub_4700EC
--------這裡出現那個延時干擾框!怎麼辦不不用說了吧!
00435861 mov
edx, [ebp+2D6Ch]
00435867 push
edx
00435868 jmp
loc_435900
程式已經沒有干擾了,但是是,關於裡面還是未註冊不爽,繼續改!
============================================================
找到字串UNREGISTERED
00401322 lea
edi, [esp+138h+var_10C]
00401326
00401326 loc_401326:
; CODE XREF: sub_4011C0+184j
00401326 mov
dl, [eax]
00401328 mov
cl, dl
0040132A cmp
dl, [edi]
0040132C jnz
short loc_40134A
0040132E test
cl, cl
00401330 jz
short loc_401346
00401332 mov
dl, [eax+1]
00401335 mov
cl, dl
00401337 cmp
dl, [edi+1]
0040133A jnz
short loc_40134A
0040133C add
eax, 2
0040133F add
edi, 2
00401342 test
cl, cl
00401344 jnz
short loc_401326
00401346
00401346 loc_401346:
; CODE XREF: sub_4011C0+170j
00401346 xor
eax, eax
00401348 jmp
short loc_40134F
0040134A ; 哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪?
0040134A
0040134A loc_40134A:
; CODE XREF: sub_4011C0+16Cj
0040134A
; sub_4011C0+17Aj
0040134A sbb
eax, eax
0040134C sbb
eax, 0FFFFFFFFh
0040134F
0040134F loc_40134F:
; CODE XREF: sub_4011C0+188j
0040134F test
eax, eax
00401351 jnz
short loc_401372
-------這裡槍斃!
00401353 mov
eax, [esp+138h+var_128]
00401357 lea
ecx, [esp+138h+var_10C]
0040135B push
eax
0040135C push
offset aRegisteredToS_ ; "Registered to %s."
00401361 push
ecx
00401362 call
ds:wsprintfA
00401368 add
esp, 0Ch
0040136B lea
edx, [esp+138h+var_10C]
0040136F push
edx
00401370 jmp
short loc_401377
00401372 ; 哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪
00401372
00401372 loc_401372: ; CODE XREF:
sub_4011C0+EAj --這裡是從004012AA條過來的,把那裡槍斃
00401372
; sub_4011C0+191j
--這裡是從00401351上面那裡條過來的,也槍斃!
00401372 push
offset aUnregistered ; "UNREGISTERED"
--------在這裡!
00401377
00401377 loc_401377:
; CODE XREF: sub_4011C0+1B0j
00401377 push
433h
0040137C mov
ecx, esi
剩下的就是用HIEW去執行槍決了!一陣亂搶掃射後世界有寂靜了下來!!
這幾天沒工夫研究它的註冊演算法!誰有空找一下吧!
洋白菜
http://www.crackbest.com
http://www.crackbest.net
相關文章
- 什麼是暴力破解?暴力破解的方法有哪些?2023-11-06
- VMware vSphere 8 Update 3 新增功能2024-08-03
- From now on2019-04-09
- 暴力破解2020-12-17
- Everybody dance now2018-10-31
- JavaScript Date.now()2019-12-05JavaScript
- win10 windows update怎麼關閉_win10 windows update關閉方法2020-09-07Win10Windows
- LRAT-2000-KIT特殊故障的分析方法2020-10-14
- WINDOWS 2000 & winxp 下關閉埠的方法2019-05-15Windows
- 暴力破解測試2019-05-20
- [提問交流]Think\Model:update方法不存在!2019-05-11
- rosdep update 超時失敗最新解決方法2022-03-01ROS
- S/4HANA生產訂單增強WORKORDER_UPDATE方法BEFORE_UPDATE引數分析2019-02-14
- 迭代暴力破解域名工具2020-08-19
- Linux防止SSH暴力破解2021-08-03Linux
- rosdep update一定能通過de簡單方法2022-03-09ROS
- Getting NOW() in your preferred time zone2021-01-03
- Oracle中的for update 和 for update nowait2024-03-28OracleAI
- 千字分享|自然語言分析NLA2022-05-30
- web類靶機暴力破解2020-10-21Web
- DVWA-Brute Force暴力破解2020-11-14
- 暴力破解zip加密檔案2024-09-26加密
- 【譯】gRPC-Web for .NET now available2020-08-11RPCWebAI
- brew update2020-02-18
- select for update2024-08-13
- win10安裝msde2000解決方法_win10安裝msde2000詳細步驟2020-02-12Win10
- 暴肝兩萬五千字助你通關Servlet2022-03-01Servlet
- laravel使用save與update方法靈活操作updated_at欄位2021-09-13Laravel
- 關於SVN update之後,引起衝突的解決方法2020-12-28
- dvwa-暴力破解(low-high)2022-03-13
- burpsuite暴力破解之四種方式2020-12-24UI
- pod update -- Failed to connect to GitHub to update the CocoaPods/Specs specs repo2018-04-17AIGithub
- 越南超級應用:Grab,Now, Zalo2018-11-03
- NOW直播——Flutter元件化開發方案2018-11-22Flutter元件化
- Now直播iOS Flutter混合工程實踐2018-08-10iOSFlutter
- Think Now:2023年精神健康報告2023-11-30
- Unlucky because now anybody can shoot with their hot fix2020-10-10
- now-go時間百寶箱2021-02-22Go
- SQL__UPDATE2019-03-16SQL