能力值:
( LV2,RANK:10 )
|
-
-
26 楼
显示恭喜,已经注册了
|
能力值:
( LV2,RANK:10 )
|
-
-
27 楼
很烂的CM,各位见笑了~~~
|
能力值:
( LV2,RANK:10 )
|
-
-
28 楼
只会用爆的,追不到码
|
能力值:
( LV2,RANK:10 )
|
-
-
29 楼
具体是什么东东我不怎么懂,不过我把字符串长度改成0,把00401653处的je改成jne,把0040195e处的je改成jne,就可以了,刚刚开始学破解,只会简单的爆破了,呵呵,我的总体思路就是尽快让它跳到0040195e,然后就好办了,嘿嘿,简单吧
|
能力值:
( LV2,RANK:10 )
|
-
-
30 楼
0040195E . /74 07 je short Crackme.00401967
00401960 . |68 D8C04200 push Crackme.0042C0D8
00401965 . |EB 05 jmp short Crackme.0040196C
00401967 > \68 3CC14200 push Crackme.0042C13C ; 恭喜你已经注册成功
|
能力值:
( LV3,RANK:20 )
|
-
-
31 楼
第1次检测处
004015EE . 85C0 TEST EAX,EAX
004015F0 . 75 11 JNZ SHORT Crackme.00401603
004015F2 . 6A 10 PUSH 10
004015F4 . 68 1CC14200 PUSH Crackme.0042C11C ; 警告:
004015F9 . 68 08C14200 PUSH Crackme.0042C108 ; 注册码不能为空!
004015FE . E9 80000000 JMP Crackme.00401683
00401603 > 8B55 74 MOV EDX,DWORD PTR SS:[EBP+74]
00401606 . 8B42 F8 MOV EAX,DWORD PTR DS:[EDX-8]
00401609 . 85C0 TEST EAX,EAX
0040160B . 75 0E JNZ SHORT Crackme.0040161B
0040160D . 6A 10 PUSH 10
0040160F . 68 1CC14200 PUSH Crackme.0042C11C ; 警告:
00401614 . 68 F4C04200 PUSH Crackme.0042C0F4 ; 用户名不能为空!
00401619 . EB 68 JMP SHORT Crackme.00401683
0040161B > 8D7C24 44 LEA EDI,DWORD PTR SS:[ESP+44]
0040161F . 83C9 FF OR ECX,FFFFFFFF
00401622 . 33C0 XOR EAX,EAX
00401624 . F2:AE REPNE SCAS BYTE PTR ES:[EDI]
00401626 . F7D1 NOT ECX
00401628 . 49 DEC ECX
00401629 . 83F9 03 CMP ECX,3
0040162C 74 49 JE SHORT Crackme.00401677 ; 不能跳转
0040162E . 8D7C24 10 LEA EDI,DWORD PTR SS:[ESP+10]
00401632 . 83C9 FF OR ECX,FFFFFFFF
00401635 . F2:AE REPNE SCAS BYTE PTR ES:[EDI]
00401637 . F7D1 NOT ECX
00401639 . 49 DEC ECX
0040163A . 83F9 08 CMP ECX,8
0040163D 74 38 JE SHORT Crackme.00401677 ; 不能跳转
0040163F . 8D4424 10 LEA EAX,DWORD PTR SS:[ESP+10]
00401643 . 68 F0C04200 PUSH Crackme.0042C0F0 ; @
00401648 . 50 PUSH EAX
00401649 . E8 62820000 CALL Crackme.004098B0
0040164E . 83C4 08 ADD ESP,8
00401651 . 85C0 TEST EAX,EAX
00401653 75 22 JNZ SHORT Crackme.00401677 ; 不能跳转
00401655 . 8D4C24 10 LEA ECX,DWORD PTR SS:[ESP+10]
00401659 . 8D5424 44 LEA EDX,DWORD PTR SS:[ESP+44]
0040165D . 51 PUSH ECX
0040165E . 52 PUSH EDX
0040165F . 8BCD MOV ECX,EBP
第2次检测处(是个循环检测)
004018F0 . 6A FF PUSH -1
004018F2 . 68 AE164200 PUSH Crackme.004216AE ; SE handler installation
004018F7 . 64:A1 0000000>MOV EAX,DWORD PTR FS:[0]
004018FD . 50 PUSH EAX
004018FE . 64:8925 00000>MOV DWORD PTR FS:[0],ESP
00401905 . 81EC 80000000 SUB ESP,80
0040190B . 53 PUSH EBX
0040190C . 56 PUSH ESI
0040190D . 57 PUSH EDI
0040190E . 8BF9 MOV EDI,ECX
00401910 . 6A 00 PUSH 0
00401912 . 8D4C24 10 LEA ECX,DWORD PTR SS:[ESP+10]
00401916 . E8 D5F8FFFF CALL Crackme.004011F0
0040191B . C78424 940000>MOV DWORD PTR SS:[ESP+94],0
00401926 . BE C0C04200 MOV ESI,Crackme.0042C0C0 ; zouzhiyong-zouzhiyong
0040192B . 8D4424 68 LEA EAX,DWORD PTR SS:[ESP+68]
0040192F > 8A10 MOV DL,BYTE PTR DS:[EAX]
00401931 . 8A1E MOV BL,BYTE PTR DS:[ESI]
00401933 . 8ACA MOV CL,DL
00401935 . 3AD3 CMP DL,BL
00401937 . 75 1E JNZ SHORT Crackme.00401957
00401939 . 84C9 TEST CL,CL
0040193B . 74 16 JE SHORT Crackme.00401953
0040193D . 8A50 01 MOV DL,BYTE PTR DS:[EAX+1]
00401940 . 8A5E 01 MOV BL,BYTE PTR DS:[ESI+1]
00401943 . 8ACA MOV CL,DL
00401945 . 3AD3 CMP DL,BL
00401947 . 75 0E JNZ SHORT Crackme.00401957
00401949 . 83C0 02 ADD EAX,2
0040194C . 83C6 02 ADD ESI,2
0040194F . 84C9 TEST CL,CL
00401951 .^ 75 DC JNZ SHORT Crackme.0040192F
00401953 > 33C0 XOR EAX,EAX
00401955 . EB 05 JMP SHORT Crackme.0040195C
00401957 > 1BC0 SBB EAX,EAX
00401959 . 83D8 FF SBB EAX,-1
0040195C > 85C0 TEST EAX,EAX
0040195E 75 07 JNZ SHORT Crackme.00401967 ; 必须跳转
00401960 . 68 D8C04200 PUSH Crackme.0042C0D8 ; 你输入的注册码不正确!
00401965 . EB 05 JMP SHORT Crackme.0040196C
00401967 > 68 3CC14200 PUSH Crackme.0042C13C ; 恭喜你!注册码正确,简单吧!
爆破的。。。。
这个 cm 保护 太菜,没分析算法,不知 咋样, 建议 多加写 anti-debug!!!!
|
能力值:
( LV2,RANK:15 )
|
-
-
32 楼
00401649 CALL 算法call
|
能力值:
( LV2,RANK:10 )
|
-
-
33 楼
找字符串就可以爆破....算法还不会看,郁闷
|
能力值:
( LV2,RANK:10 )
|
-
-
34 楼
看下..........
|