能力值:
( LV2,RANK:10 )
|
-
-
2 楼
在线等,怎么没有回复的啊?
|
能力值:
( LV2,RANK:10 )
|
-
-
3 楼
我这个软件下载也需要kx吗?怎么没人帮忙呢,我放在了看雪群二里面了。希望二群的朋友帮我看看。
|
能力值:
( LV2,RANK:10 )
|
-
-
4 楼
关键call上就是关键的跳了 仔细找找
我也是菜鸟 呵呵
|
能力值:
( LV2,RANK:10 )
|
-
-
5 楼
正确的和错误的都是CALL 这个MESSAGEBOX 函数,只是CALL这个之前,PUSH的变量会不同,变量的值是一个字符串,也是"正确"或者"错误"的文字.
一般CALL 的前面是判断,判断成立与否,来显示相应的正确或错误
|
能力值:
( LV2,RANK:10 )
|
-
-
6 楼
我感觉应该在这一段的段头f2
我就找到
00411F75 55 push ebp
00411F76 8BEC mov ebp,esp
00411F78 81EC 14010000 sub esp,114
00411F7E 53 push ebx
00411F7F 56 push esi
00411F80 57 push edi
00411F81 33DB xor ebx,ebx
00411F83 8BF9 mov edi,ecx
00411F85 53 push ebx
00411F86 897D F0 mov dword ptr ss:[ebp-10],edi
00411F89 E8 B9FFFFFF call crackme.00411F47
00411F8E 8D45 FC lea eax,dword ptr ss:[ebp-4]
00411F91 50 push eax
00411F92 53 push ebx
00411F93 E8 55010000 call crackme.004120ED
00411F98 33F6 xor esi,esi
00411F9A 3BC3 cmp eax,ebx
00411F9C 8945 F4 mov dword ptr ss:[ebp-C],eax
00411F9F 74 18 je short crackme.00411FB9
00411FA1 53 push ebx
00411FA2 53 push ebx
00411FA3 68 76030000 push 376
00411FA8 FF75 FC push dword ptr ss:[ebp-4]
00411FAB FF15 D4534100 call dword ptr ds:[<&user32.SendM>; USER32.SendMessageA
00411FB1 3BC3 cmp eax,ebx
00411FB3 74 04 je short crackme.00411FB9
00411FB5 8BF0 mov esi,eax
00411FB7 EB 0A jmp short crackme.00411FC3
00411FB9 3BFB cmp edi,ebx
00411FBB 74 06 je short crackme.00411FC3
00411FBD 8DB7 9C000000 lea esi,dword ptr ds:[edi+9C]
00411FC3 3BF3 cmp esi,ebx
00411FC5 895D F8 mov dword ptr ss:[ebp-8],ebx
00411FC8 74 13 je short crackme.00411FDD
00411FCA 8B06 mov eax,dword ptr ds:[esi]
00411FCC 8945 F8 mov dword ptr ss:[ebp-8],eax
00411FCF 8B45 10 mov eax,dword ptr ss:[ebp+10]
00411FD2 3BC3 cmp eax,ebx
00411FD4 74 07 je short crackme.00411FDD
00411FD6 05 00000300 add eax,30000
00411FDB 8906 mov dword ptr ds:[esi],eax
00411FDD 8B5D 0C mov ebx,dword ptr ss:[ebp+C]
00411FE0 F6C3 F0 test bl,0F0
00411FE3 75 17 jnz short crackme.00411FFC
00411FE5 8BC3 mov eax,ebx
00411FE7 83E0 0F and eax,0F
00411FEA 83F8 01 cmp eax,1
00411FED 76 0A jbe short crackme.00411FF9
00411FEF 83F8 02 cmp eax,2
00411FF2 76 08 jbe short crackme.00411FFC
00411FF4 83F8 04 cmp eax,4
00411FF7 77 03 ja short crackme.00411FFC
00411FF9 83CB 30 or ebx,30
00411FFC 85FF test edi,edi
00411FFE 74 05 je short crackme.00412005
00412000 8B7F 78 mov edi,dword ptr ds:[edi+78]
00412003 EB 1A jmp short crackme.0041201F
00412005 8D85 ECFEFFFF lea eax,dword ptr ss:[ebp-114]
0041200B 68 04010000 push 104
00412010 50 push eax
00412011 6A 00 push 0
00412013 8DBD ECFEFFFF lea edi,dword ptr ss:[ebp-114]
00412019 FF15 F0514100 call dword ptr ds:[<&kernel32.Get>; kernel32.GetModuleFileNameA
0041201F 53 push ebx
00412020 57 push edi
00412021 FF75 08 push dword ptr ss:[ebp+8]
00412024 FF75 F4 push dword ptr ss:[ebp-C]
00412027 FF15 A8534100 call dword ptr ds:[<&user32.Messa>; 弹出错误对话框
0041202D 85F6 test esi,esi
0041202F 8BF8 mov edi,eax
00412031 74 05 je short crackme.00412038
00412033 8B45 F8 mov eax,dword ptr ss:[ebp-8]
00412036 8906 mov dword ptr ds:[esi],eax
00412038 837D FC 00 cmp dword ptr ss:[ebp-4],0
0041203C 74 0B je short crackme.00412049
0041203E 6A 01 push 1
00412040 FF75 FC push dword ptr ss:[ebp-4]
00412043 FF15 B4534100 call dword ptr ds:[<&user32.Enabl>; USER32.EnableWindow
00412049 8B4D F0 mov ecx,dword ptr ss:[ebp-10]
0041204C 6A 01 push 1
0041204E E8 F4FEFFFF call crackme.00411F47
00412053 8BC7 mov eax,edi
00412055 5F pop edi
00412056 5E pop esi
00412057 5B pop ebx
00412058 C9 leave
00412059 C2 0C00 retn 0C
最上面那里下断点对吧。
|
能力值:
( LV3,RANK:20 )
|
-
-
7 楼
0040143C . 83E1 03 and ecx, 3
0040143F . F3:A4 rep movs byte ptr es:[edi], byte ptr>; 用户名运算
00401441 > 8A4C04 1C mov cl, byte ptr [esp+eax+1C]
00401445 . C0E1 02 shl cl, 2
00401448 . 80F1 25 xor cl, 25
0040144B . 884C04 1C mov byte ptr [esp+eax+1C], cl
0040144F . 40 inc eax
00401450 . 83F8 0A cmp eax, 0A //用户名由ddsoft ,扩展了几位。
00401453 .^ 7C EC jl short 00401441
00401455 . 33F6 xor esi, esi
00401457 > 0FBE4434 1C movsx eax, byte ptr [esp+esi+1C]
0040145C . 8D5424 14 lea edx, dword ptr [esp+14]
00401460 . 6A 0A push 0A
00401462 . 52 push edx
00401463 . 50 push eax
00401464 . E8 A6600000 call 0040750F
00401469 . 8A4424 20 mov al, byte ptr [esp+20]
0040146D . 8A8C34 8C0000>mov cl, byte ptr [esp+esi+8C]
00401474 . 83C4 0C add esp, 0C
00401477 . 3AC1 cmp al, cl
00401479 . 884434 1C mov byte ptr [esp+esi+1C], al
0040147D . 74 02 je short 00401481
0040147F . 32DB xor bl, bl
00401481 > 34 12 xor al, 12
00401483 . 884434 1C mov byte ptr [esp+esi+1C], al
00401487 . 46 inc esi
00401488 . 83FE 04 cmp esi, 4
0040148B .^ 7C CA jl short 00401457
0040148D . 33C9 xor ecx, ecx
0040148F > 0FBE440C 20 movsx eax, byte ptr [esp+ecx+20] //。。。。
00401494 . 83F0 97 xor eax, FFFFFF97
00401497 . BE 1A000000 mov esi, 1A
0040149C . 99 cdq
0040149D . F7FE idiv esi
0040149F . 8A840C 840000>mov al, byte ptr [esp+ecx+84]
004014A6 . 80C2 41 add dl, 41
004014A9 . 3AD0 cmp dl, al
004014AB . 88540C 20 mov byte ptr [esp+ecx+20], dl
004014AF . 74 02 je short 004014B3
004014B1 . 32DB xor bl, bl
004014B3 > 80F2 76 xor dl, 76
004014B6 . 88540C 20 mov byte ptr [esp+ecx+20], dl
004014BA . 41 inc ecx
004014BB . 8D51 04 lea edx, dword ptr [ecx+4]
004014BE . 83FA 0A cmp edx, 0A ;10位注册码
004014C1 .^ 7C CC jl short 0040148F ; 注册码运算
004014C3 . 84DB test bl, bl
|
能力值:
( LV2,RANK:10 )
|
-
-
8 楼
找上面几个大跳 能跳过那条提示的 修改下跳转条件 实现爆破
试试看可以不可以?
菜鸟 说错了勿笑 呵呵
|
能力值:
( LV3,RANK:20 )
|
-
-
9 楼
00401400 > \8D7C24 18 lea edi, dword ptr [esp+18] ; 用户名ddsoft
00401404 . 83C9 FF or ecx, FFFFFFFF
00401407 . 33C0 xor eax, eax
00401409 . F2:AE repne scas byte ptr es:[edi] ; 第一个字符d
0040140B . F7D1 not ecx
0040140D . 49 dec ecx
0040140E . 0F84 1F010000 je 00401533
00401414 . BF ACA04100 mov edi, 0041A0AC ; ASCII "6D*h!dN^!g"
不是明码比较啊。。有参与运算。帖子里已经给出地址了,自己分析,我算法不行。还是不跟了。有点晕。
|