大老的打狗教程第一篇如解掉hasp的狗!希望對大家有所幫助!大老=[DCG]= (12千字)
大老的打狗教程第一篇如解掉hasp的狗!希望對大家有所幫助!大老=[DCG]=
程式名:國外的工程類軟體dasxx
保護 :hasp4
m1這是以色列的狗 m1是代表他有儲存器
所用工具:trw2000 wasm32
我寫的打狗教程這是第一篇!我共會寫3篇的!寫第一篇寫個網上中文的教程比較少的hasp4的狗保護的軟體!
我只是大體說一下破解的思路!
希望對大家有所幫助!
(1) 第一部分
=============================================================================================
:0042659A 50
push eax
:0042659B 51
push ecx
:0042659C 52
push edx
:0042659D
53
push ebx
:0042659E 68FE3F0000
push 00003FFE ===>這就是hasp狗讀狗時要用到的密碼! (1)
:004265A3 687B1D0000
push 00001D7B ===>hasp狗的密碼!
(2)
:004265A8 6800000000
push 00000000
:004265AD 6800000000
push 00000000
:004265B2 6801000000
push 00000001
:004265B7 E8A7FBFFFF
call 00426163 ====>讀狗 (1)
:004265BC 83C424
add esp, 00000024
:004265BF 8B45FC
mov eax, dword ptr [ebp-04]==> 讀狗後返回值=1就是有狗!
:004265C2 B901000000
mov ecx, 00000001
:004265C7 39C8
cmp eax, ecx
:004265C9 0F85EF020000 jne 004268BE
===> 跳就完蛋
:004265CF 8D45F0
lea eax, dword ptr [ebp-10]
:004265D2 8D4DF4
lea ecx, dword ptr [ebp-0C]
:004265D5 8D55F8
lea edx, dword ptr [ebp-08]
:004265D8 8D5DFC
lea ebx, dword ptr [ebp-04]
:004265DB 50
push eax
:004265DC 51
push ecx
:004265DD 52
push edx
:004265DE 53
push ebx
:004265DF
68FE3F0000 push 00003FFE
:004265E4 687B1D0000 push 00001D7B
:004265E9 6800000000 push
00000000
:004265EE 6800000000
push 00000000
:004265F3 6805000000
push 00000005
:004265F8 E866FBFFFF
call 00426163 ========>讀狗(2)
:004265FD 83C424
add esp, 00000024
:00426600
8B45FC mov eax,
dword ptr [ebp-04] ==> 讀狗後返回值=1就是有狗!
:00426603 B901000000
mov ecx, 00000001
:00426608 39C8
cmp eax, ecx
:0042660A
0F85C2010000 jne 004267D2
===> 跳就完蛋
:00426610 8B45F8
mov eax, dword ptr [ebp-08] ===>另外一個返回值
:00426613
39C8 cmp
eax, ecx
:00426615 0F85B7010000
jne 004267D2 ====>跳就完蛋!
:0042661B 8D0518E74500
lea eax, dword ptr [0045E718]
:00426621 8B4DF4
mov ecx, dword ptr [ebp-0C]
:00426624 668908
mov word ptr [eax], cx
:00426627 6885510000
push 00005185
:0042662C 8D05BC614200
lea eax, dword ptr [004261BC]
:00426632 8D4DE0
lea ecx, dword ptr [ebp-20]
:00426635 51
push ecx
:00426636 FFD0
call eax 計算返回的資料
:00426638 83C408
add esp, 00000008
:0042663B 8B45E0
mov eax, dword ptr [ebp-20]====>返回資料(1) 正確值是bb2
:0042663E B9B20B0000
mov ecx, 00000BB2 這裡是要比較的值!
:00426643 39C8
cmp eax, ecx ===>比較
:00426645 0F8530000000
jne 0042667B ===>跳到報錯
:0042664B 8B45E4
mov eax, dword ptr [ebp-1C] ====>返回資料(2) 正確值是A6FE
:0042664E B9FEA60000 mov
ecx, 0000A6FE
:00426653 39C8
cmp eax, ecx ===>比較
:00426655 0F8520000000
jne 0042667B ===>跳到報錯
:0042665B 8B45E8
mov eax, dword ptr [ebp-18]
====>返回資料(3) 正確值是6A14
:0042665E B9146A0000
mov ecx, 00006A14
:00426663 39C8
cmp eax, ecx ===>比較
:0426665
0F8510000000 jne 0042667B ===>跳到報錯 !
:0042666B 8B45EC
mov eax, dword ptr [ebp-14]====>返回資料(4) 正確值是714D
:0042666E B94D710000
mov ecx, 0000714D
:00426673 39C8
cmp eax, ecx ===>比較
相等的話跳到正確處理流程
:00426675 0F84FC000000
je 00426777 ===>跳到正確處理流程 ===關鍵(1)====
* Referenced by a (U)nconditional
or (C)onditional Jump at Addresses:
|:00426645(C), :00426655(C), :00426665(C)
|
:0042667B 8D0552924700 lea
eax, dword ptr [00479252]
:00426681 6801000000
push 00000001
:00426686 50
push eax
:00426687 6800000000
push 00000000
:00426687 6800000000
push 00000000
* Reference
To: cvirt.LoadPanel, Ord:0133h
|
:0042668C
E891B3FDFF Call 00401A22
:00426691 8D4DDC
lea ecx, dword ptr [ebp-24]
:00426694 8901
mov dword ptr [ecx], eax
:00426696 8B45DC
mov eax, dword ptr [ebp-24]
:00426699 B900000000 mov
ecx, 00000000
:0042669E 39C8
cmp eax, ecx
:004266A0 0F8D20000000
jnl 004266C6
* Reference To: cvirt.CVI_Beep, Ord:0259h
|
:004266A6 E845B8FDFF
Call 00401EF0
:004266AB 8D05EA924700
lea eax, dword ptr [004792EA]
:004266B1 8D0DAA924700
lea ecx, dword ptr [004792AA]
:004266B7
50
push eax
:004266B8 51
push ecx
* Reference To: cvirt.MessagePopup, Ord:014Dh
===>報錯資訊!
|
:004266B9 E8CCB7FDFF
Call 00401E8A
:004266BE 8D056A674200
lea eax, dword ptr [0042676A]
:004266C4
FFE0 jmp
eax
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004266A0(C)
|
:004266C6 6800000000
push 00000000
:004266CB 6812020000
push 00000212
:004266D0 6803000000
push 00000003
==================================================================================================
你這樣處理後執行程式還會有問題的!看樣子是沒有解決完!我們們在來看看!
第二部分
===================================================================================================
第一部分的程式(===關鍵(1)====)跳轉後就到了這裡le's go
* Referenced by a (U)nconditional
or (C)onditional Jump at Address:
|:00426675(C)
|
:00426777 E8CBFBFFFF
call 00426347
:0042677C 8D45FC
lea eax, dword ptr [ebp-04]
:0042677F B903000000 mov
ecx, 00000003
:00426784 8908
mov dword ptr [eax], ecx
:00426786 8D4DF0
lea ecx, dword ptr [ebp-10]
:00426789 8D55F4
lea edx, dword ptr [ebp-0C]
:0042678C 8D5DF8
lea ebx, dword ptr [ebp-08]
:0042678F 51
push ecx
:00426790 52
push edx
:00426791 53
push ebx
:00426792 50
push eax
:00426793
68FE3F0000 push 00003FFE
:00426798 687B1D0000 push 00001D7B
:0042679D 6800000000 push
00000000
:004267A2 6800000000
push 00000000
:004267A7 6803000000
push 00000003
:004267AC E8B2F9FFFF
call 00426163 ====>這裡又有一處讀狗!
:004267B1 83C424
add esp, 00000024
:004267B4
8B45F4 mov eax,
dword ptr [ebp-0C] ====>返回值(1)應該是0
:004267B7 B900000000
mov ecx, 00000000
:004267BC 39C8
cmp eax, ecx ===>比較
:004267BE 0F85DE010000 jne 004269A2
不跳
:004267C4 8B45F8
mov eax, dword ptr [ebp-08]
:004267C7 0FB7C0
movzx eax, ax
:004267CA 8D0DA7694200
lea ecx, dword ptr [004269A7] 注意這裡ecx的值是從這裡的地址裡來的
:004267D0 FFE1
jmp ecx =======>跳到下一個部分!go ====關鍵2===
* Referenced
by a (U)nconditional or (C)onditional Jump at Addresses:
|:0042660A(C), :00426615(C)
|
:004267D2 8D0545924700 lea
eax, dword ptr [00479245]
:004267D8 6801000000
push 00000001
:004267DD 50
push eax
:004267DE 6800000000
push 00000000
* Reference
To: cvirt.LoadPanel, Ord:0133h
|
:004267E3
E83AB2FDFF Call 00401A22
:004267E8 8D4DDC
lea ecx, dword ptr [ebp-24]
:004267EB 8901
mov dword ptr [ecx], eax
:004267ED 8B45DC
mov eax, dword ptr [ebp-24]
:004267F0 B900000000 mov
ecx, 00000000
:004267F5 39C8
cmp eax, ecx
:004267F7 0F8D20000000
jnl 0042681D
* Reference To: cvirt.CVI_Beep, Ord:0259h
|
:004267FD E8EEB6FDFF
Call 00401EF0
:00426802 8D05BE924700
lea eax, dword ptr [004792BE]
:00426808 8D0D96924700
lea ecx, dword ptr [00479296]
:0042680E
50
push eax
:0042680F 51
push ecx
* Reference To: cvirt.MessagePopup, Ord:014Dh
====>出錯資訊!
|
:00426810 E875B6FDFF
Call 00401E8A
:00426815 8D05A9684200
lea eax, dword ptr [004268A9]
:0042681B
FFE0 jmp
eax
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004267F7(C)
|
:0042681D 6800000000
push 00000000
:00426822 6812020000
push 00000212
:00426827 6803000000
push 00000003
:0042682C 8B45DC
mov eax, dword ptr [ebp-24]
:0042682F 50
push eax
* Reference To: cvirt.SetCtrlAttribute, Ord:00AEh
|
:00426830 E8BFACFDFF
Call 004014F4
:00426835 83C410
add esp, 00000010
:00426838 6800000000
push 00000000
:0042683D 6812020000
push 00000212
:00426842 6804000000
push 00000004
=======================================================================================================
經過上部分!我們們看看下面部分如何! 經過對====關鍵2===的跟蹤發現!到了下面的程式!
:0042AFCE 8908
mov dword ptr [eax],
ecx
:0042AFD0 E8B1B5FFFF
call 00426586
:0042AFD5 8D8DE8FEFFFF
lea ecx, dword ptr [ebp+FFFFFEE8]
:0042AFDB 668901
mov word ptr [ecx], ax
:0042AFDE
668B85E8FEFFFF mov ax, word ptr [ebp+FFFFFEE8]
:0042AFE5 0FB7C0
movzx eax, ax
:0042AFE8 B901000000
mov ecx, 00000001
:0042AFED 39C8
cmp eax, ecx ======注意這個比較
:0042AFEF 0F8432000000
je 0042B027 =====>不跳就over
*
Possible Reference to String Resource ID=65535: "Das32"
|
:0042AFF5 B9FFFF0000
mov ecx, 0000FFFF
:0042AFFA 39C8
cmp eax, ecx
:0042AFFC 0F8425000000
je 0042B027
* Reference To: cvirt.CVI_Beep,
Ord:0259h
|
:0042B002 E8E96EFDFF
Call 00401EF0
:0042B007 8D0504B04700
lea eax, dword ptr [0047B004]
:0042B00D
8D0DAFB34700 lea ecx, dword ptr [0047B3AF]
:0042B013 50
push eax
:0042B014 51
push ecx
* Reference To: cvirt.MessagePopup,
Ord:014Dh =====出錯資訊!
|
:0042B015 E8706EFDFF
Call 00401E8A
:0042B01A 6800000000
push 00000000
:0042B01F E82F75FDFF
call 00402553
:0042B024 83C404
add esp, 00000004
* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:0042AFEF(C), :0042AFFC(C)
|
:0042B027 8D45FC
lea eax, dword ptr [ebp-04] ====正確的流程!
:0042B02A 50
push eax
:0042B02B 6801000000
push 00000001
======================================================================================================
經過了這部分後狗部分就解掉了!
總結!
上面的部分只是解狗裡面的一種而已!想這個軟體還有好幾種解法!這種解法比較容易理解!呵呵~我就獻醜了!希望大家不要笑我!
希望大家經常來我的論壇來看看交流一下!現在有些人對我有意見!哪是不可避免的!也是很正常的!!謝謝大家看完此文! 如果你覺得寫的還行請回個貼子!支援一下!謝謝!
如果要轉載請保留完整
大老=[DCG]=
dalao@top86.com
http://dalao2002.yeah.net
2002.6.25
相關文章
- 大老的打狗教程第二篇如解掉,深思3的狗加密的軟體!希望對大家有所幫助!大老=[DCG]=
(13千字)2015-11-15加密
- 大老的打狗教程第三篇(最終篇)如何解掉,rockey4的狗加密的軟體!
(12千字)2015-11-15加密
- 擼一個 webpack 外掛,希望對大家有所幫助2021-12-16Web
- 工作的智慧非php 大家看一看 希望會有所幫助2007-07-07PHP
- 異想天開的打狗記錄(高手免進) (12千字)2002-07-17
- TDMD軟體狗破解方法(帶狗殺狗) (6千字)2001-10-25
- oracle中各程式的觸發條件(希望對大家有幫助) (zt)2007-06-27Oracle
- 本人作品---夢龍智慧專案管理99A解狗教程(獻給對加密狗有興趣的朋友)
(13千字)2015-11-15專案管理加密
- 本人作品,2488的解狗教程(DOS下的狗),應客戶要求,不便說出軟體名字。 (2千字)2002-02-18
- 如何破解深思Ⅲ加密狗!想解狗的朋友過來看了!
(10千字)2015-11-15加密
- 今天講解下工作流引擎,希望對大家有幫助2022-06-04
- IT狗的日常2013-12-08
- 面試完總結的28道Nodejs面試題,希望對下一位筆試同學有所幫助!2019-12-09NodeJS面試題筆試
- 軟體狗,dongle
(3千字)2002-12-17
- Hardlock加密狗破解過程-----外殼型加密狗的破解方法 (7千字)2001-10-15加密
- Shub-Nigurrath的軟體狗教程2015-11-15
- 大老師的前生——AlphaMao專案的回顧和總結2019-01-12
- 網際網路公司背後的“大老闆”——資訊圖2016-09-22
- 希望找到的這幾個MVC面試題對各位有幫助2020-09-29MVC面試題
- 整理分享5款可能對大家有幫助的軟體2023-12-01
- 彩虹狗GS-MH破解-淺談狗的破解方法2015-11-15
- 解狗思路的一點總結!純屬個人意見! (3千字)2002-10-21
- 打狗棒法:TDSD軟體狗 (20千字)2002-07-02
- Dog Parker智慧狗窩能有償“看狗” 再不怕出門丟狗2016-11-21
- 分享 2020年 求職的艱苦經歷, 希望對大家有幫助和帶來一些信心.2020-04-17求職
- 我來寫一下LanSentry的解狗破解過程 (5千字)2002-01-19
- Delphi寫的讀狗程式的簡單逆向對比.2015-11-15
- 打狗棒法:深思3軟體狗(47千字)2002-06-30
- 菜狗的KMP學習2024-03-26KMP
- 安裝安全狗和寶塔mysql打不開2024-11-16MySql
- 從事iOS研發5年的面經——希望對你們有幫助2018-05-15iOS
- 一個三年Java程式設計師的面試總結!絕對會對你有所幫助!2019-01-05Java程式設計師面試
- 如何破解掉vt4.0的軟體狗(一種醫藥用影像分析軟體) 不錯的文章
(7千字)2015-11-15
- 小夥在某知名公司的Python面試題詳解,希望對各位以後面試有幫助2018-12-18Python面試題
- iOS 的看門狗機制2018-09-18iOS
- IT的消費化:尾巴搖狗2011-03-10
- 絕對菜鳥解狗教程――qdcrack作品之一(發表在我論壇的文章)寫得非常好!初學者必看呀!
(11千字)2015-11-15
- 青島阿牛解狗教程之一(速達3000pro網路版) (11千字)2002-02-07