暴力破解Security setup II (7千字)
小弟天天玩狗,結果被瘋狗咬得全身是傷,這次換一點口味了,來一個security setup II的爆破,呵呵,沒辦法啦,習慣用暴力啊。
好,我們先分析它是不是加殼的,分析的工具就不用我說了吧(廢話),結果它是用UPX來加殼的(聽說是很溫柔的殼呵,我的MM有那麼溫柔就好了),我們先用procdump32把它脫掉(不是脫衣服啦,別想歪啦)。脫掉後你發現它不能執行,呵呵,它有CRC校檢,當然是不能執行啦。好,我們用TRW2000跟蹤它,看它的CRC在什麼地方:
:0045159F E8F822FBFF call 0040389C
:004515A4 8B0DF0344500 mov ecx, dword
ptr [004534F0]
:004515AA A148344500 mov eax,
dword ptr [00453448]
:004515AF 8B00
mov eax, dword ptr [eax]
:004515B1 8B15ACCA4400 mov edx, dword
ptr [0044CAAC]
:004515B7 E83CB1FDFF call 0042C6F8
<=====F8進入,為什麼要進入?我倒....當然是用F10帶過就S La S La啦
:004515BC 8B0D44334500 mov ecx, dword
ptr [00453344]
:004515C2 A148344500 mov eax,
dword ptr [00453448]
進入後繼續F10:
:0042C717 33C0
xor eax, eax
:0042C719 55
push ebp
:0042C71A 683BC74200 push 0042C73B
:0042C71F 64FF30
push dword ptr fs:[eax]
:0042C722 648920
mov dword ptr fs:[eax], esp
:0042C725 8BCB
mov ecx, ebx
:0042C727 33D2
xor edx, edx
:0042C729 8B45F8
mov eax, dword ptr [ebp-08]
:0042C72C 8B30
mov esi, dword ptr [eax]
:0042C72E FF5624
call [esi+24] <=====F8進入
:0042C731 33C0
xor eax, eax
:0042C733 5A
pop edx
GO.....
:00427999 68CD794200 push 004279CD
:0042799E 64FF30
push dword ptr fs:[eax]
:004279A1 648920
mov dword ptr fs:[eax], esp
:004279A4 8B45FC
mov eax, dword ptr [ebp-04]
:004279A7 6683B8CE01000000 cmp word ptr [eax+000001CE],
0000
:004279AF 7412
je 004279C3
:004279B1 8B5DFC
mov ebx, dword ptr [ebp-04]
:004279B4 8B55FC
mov edx, dword ptr [ebp-04]
:004279B7 8B83D0010000 mov eax, dword
ptr [ebx+000001D0]
:004279BD FF93CC010000 call dword ptr
[ebx+000001CC] <=====F8進入
F10.....停:
:0044D436 3B05EC474500 cmp eax, dword
ptr [004547EC]
:0044D43C 741A
je 0044D458
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0044D448(C)
|
:0044D43E 813DEC474500E7030000 cmp dword ptr [004547EC], 000003E7
:0044D448 75F4
jne 0044D43E <=====當你走到這裡的時候,你會發現你一直在這裡迴圈,這裡就是程式讓我們S翹翹的地方,所以要把它改為90
90
:0044D44A EB0C
jmp 0044D458
* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:0044D42F(C), :0044D456(C)
|
:0044D44C 813DEC474500E7030000 cmp dword ptr [004547EC], 000003E7
:0044D456 75F4
jne 0044D44C
好了,下面我們要去掉它的時間限制,通常是把日期改大,結果是執行後就會有一個警告框說你是非法使用者呵:
:0044D37D DB7DE8
fstp tbyte ptr [ebp-18]
:0044D380 9B
wait
:0044D381 E836AAFBFF call 00407DBC
<=====呼叫日期比較的CALL
:0044D386 DB6DE8
fld tbyte ptr [ebp-18]
:0044D389 DED9
fcompp <=====呵呵,這些都是80X87指令,我也不是很瞭解啊,反正是比較日期就是了
:0044D38B DFE0
fstsw ax
:0044D38D 9E
sahf
:0044D38E 7325
jnb 0044D3B5 <====如果過期就不跳,你就S La S La的了,當然是改為JMPS 0044D4B5啦
:0044D390 6A00
push 00000000
:0044D392 8D4DF8
lea ecx, dword ptr [ebp-08]
:0044D395 BA0A000000 mov edx,
0000000A
:0044D39A B804D64400 mov eax,
0044D604
:0044D39F E8DC74FFFF call 00444880
:0044D3A4 8B45F8
mov eax, dword ptr [ebp-08]
:0044D3A7 668B0D5CD64400 mov cx, word ptr
[0044D65C]
:0044D3AE 33D2
xor edx, edx
:0044D3B0 E8A394FEFF call 00436858
<====出錯資訊框
* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:0044D350(C), :0044D38E(C)
|
:0044D3B5 33C0
xor eax, eax
破完了嗎?還沒有,如果沒有註冊,在執行時會有一個延遲視窗,你很討厭它是嗎?呵呵,讓我們來收拾它,我們用REGMON監視軟體,發現它多次查詢SOFTWARE\IDP\REG\SSU20這個註冊鍵,看名稱就知道它和註冊有關的了,我們用W32DASM反彙編程式,在串式參考中找到SOFTWARE\IDP\REG\SSU20這個字串,然後找到下面的位置:
:0044592C 8D45E8
lea eax, dword ptr [ebp-18]
:0044592F 50
push eax
* Possible StringData Ref from Data Obj ->"30"
|
:00445930 B99C614400 mov ecx,
0044619C
* Possible StringData Ref from Data Obj ->"SOFTWARE\IDP\REG\SSU20"
|
:00445935 BAA8614400 mov edx,
004461A8 <====我們可以在這裡設斷點
:0044593A B802000080 mov eax,
80000002
:0044593F E87CEEFFFF call 004447C0
:00445944 837DE800 cmp
dword ptr [ebp-18], 00000000
:00445948 752A
jne 00445974
:0044594A 8D4DE8
lea ecx, dword ptr [ebp-18]
:0044594D BA0A000000 mov edx,
0000000A
* Possible StringData Ref from Data Obj ->"_DXOMCY^OXON"
程式中斷後不要清除斷點,然後一直按F10,中間會有一個CALL被再次中斷,直到看到下面的程式碼:
:00450547 E89C95FEFF call 00439AE8
:0045054C 5A
pop edx
:0045054D E82295FEFF call 00439A74
:00450552 E89953FFFF call 004458F0
<=====關鍵CALL
:00450557 84C0
test al, al <=====未註冊時不跳,所以這裡可以改為mov al,1
:00450559 0F85B5000000 jne 00450614
<=====這裡改為JMPS 00450614
:0045055F 8D4DF8
lea ecx, dword ptr [ebp-08]
:00450562 BA24000000 mov edx,
00000024
:00450567 B8200A4500 mov eax,
00450A20
:0045056C E80F43FFFF call 00444880
:00450571 8B45F8
mov eax, dword ptr [ebp-08]
:00450574 E813E9FFFF call 0044EE8C
:00450579 8D4DF8
lea ecx, dword ptr [ebp-08]
:0045057C BA24000000 mov edx,
00000024
:00450581 B8200A4500 mov eax,
00450A20
:00450586 E8F542FFFF call 00444880
:0045058B 8D45F8
lea eax, dword ptr [ebp-08]
:0045058E BA480A4500 mov edx,
00450A48
:00450593 E83435FBFF call 00403ACC
:00450598 8B55F8
mov edx, dword ptr [ebp-08]
:0045059B 8B8624050000 mov eax, dword
ptr [esi+00000524]
:004505A1 E81AC1FCFF call 0041C6C0
:004505A6 8B0D48344500 mov ecx, dword
ptr [00453448]
:004505AC 8B09
mov ecx, dword ptr [ecx]
:004505AE B201
mov dl, 01
:004505B0 A1F0C54400 mov eax,
dword ptr [0044C5F0]
:004505B5 E8EA72FDFF call 004278A4
:004505BA 8B15EC324500 mov edx, dword
ptr [004532EC]
:004505C0 8902
mov dword ptr [edx], eax
:004505C2 33C0
xor eax, eax
:004505C4 55
push ebp
:004505C5 680D064500 push 0045060D
:004505CA 64FF30
push dword ptr fs:[eax]
:004505CD 648920
mov dword ptr fs:[eax], esp
:004505D0 A1EC324500 mov eax,
dword ptr [004532EC]
:004505D5 8B00
mov eax, dword ptr [eax]
:004505D7 E870A3FDFF call 0042A94C
<=====用F10帶過時,延遲畫面就出現了,所以往上看什麼地方能跳過這裡
:004505DC A1EC324500 mov eax,
dword ptr [004532EC]
:004505E1 8B00
mov eax, dword ptr [eax]
:004505E3 B201
mov dl, 01
:004505E5 E8767DFDFF call 00428360
其實如果你想做出註冊檔案,可以跟蹤並分析它的演算法,小弟我一看到演算法就頭痛,所以只能用點暴力了,呵呵
相關文章
- 暴力破解Paragon CD Emulator時間及功能限制 (7千字)2001-03-24Go
- 暴力破解3 (6千字)2001-02-18
- 來一篇:暴力破解Crystal Button 1.31A (7千字)2015-11-15
- SYSTEM CLEANER 暴力破解 (1千字)2001-01-04
- Spring Security(7)2022-11-29Spring
- 暴力破解windows Commander 4.52 (5千字)2001-02-19Windows
- Kryptel 3.8 暴力破解過程 (18千字)2001-09-18
- DISKdata v3.2.0之暴力破解 (6千字)2000-10-01
- image optimizer v3.0之暴力破解 (6千字)2000-10-12
- Tornado2之Licence暴力破解 (15千字)2000-10-22
- Update NOW 2000 暴力破解方法! (8千字)2001-02-11
- 暴力破解《網路吸血鬼3.3》 (9千字)2001-03-15
- 流光2001完全暴力破解 (3千字)2001-08-14
- 禁用登錄檔之暴力破解法。 (4千字)2001-10-14
- freeResV0.94瘋狂暴力破解 (3千字)2002-01-09
- UltraEdit-32 v8.10.a 暴力破解 (4千字)2001-05-11
- Centos7使用DenyHosts防止ssh暴力破解2020-06-07CentOS
- 申請加入BCG破文二--一位元組暴力破解S-Demo2.0 (7千字)2001-10-27
- 也談《傲世三國》的暴力破解法 (11千字)2001-01-10
- 暴力破解 程式獵人(Phunter) V1.30 (11千字)2001-10-25
- EasyBoot(7千字)2015-11-15boot
- FISH精美屏保暴力破解---WD32ASM893版 (6千字)2001-02-05ASM
- SQL Server 2005 Developer Edition English Version Setup on Windows 72010-06-18SQLServerDeveloperWindows
- Windows Lotto Pro 2000 V5.39之暴力破解
(10千字)2001-04-02Windows
- setup types & setup standard operation(BOM>Rountings)2007-11-05
- MuseMail Setup2012-08-14AI
- 破解ClockWise 3.03 (7千字)2001-06-06
- 初學者(7) (4千字)2000-05-05
- 初學者(22) (7千字)2000-08-09
- 初學者(23) (7千字)2000-08-13
- 翻譯一篇很簡單的暴力破解installshield! (6千字)2001-03-15
- 分析家資料批量轉換器暴力破解手記 (3千字)2001-09-07
- 暴力破解2020-12-17
- 無限遊戲存檔II v2.3.38 **過程 (3千字)2002-01-12遊戲
- SEH in ASM 研究(一) (7千字)2001-12-29ASM
- Oracle Audit setup2022-11-26Oracle
- SETUP(安裝)2020-09-28
- oracle dataguard setup2011-01-27Oracle