首页
社区
课程
招聘
直接PATCH ASPR2教程。
发表于: 2005-3-4 10:25 4716

直接PATCH ASPR2教程。

2005-3-4 10:25
4716
Inline Patching Asprotect

谁搞过来
http://forum.exetools.com/showthread.php?t=7012

[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)

收藏
免费 0
支持
分享
最新回复 (11)
雪    币: 196
活跃值: (2162)
能力值: ( LV4,RANK:50 )
在线值:
发帖
回帖
粉丝
2
Inline patching asprotect

This is not really a tutorial , but synopsis on the basis of inline patching asprotect. The general tactic is
very useful indeed for patching any protected target by other protections as well.

To make things easy I will only touch the ground with you on  the basic that you need to accomplish the goal.
  
The goal is to pass through the protection and patch the target code. I will do that by attaching a dll that oversees the execution of  protected target, if succeeded , then your imagination and skills are the limit of what you can do. Asprotect will refuse to take our remedy, we either have to force it or play a trick on it
so I will go with gentle one, the trick:

The trick is well known and can be accomplished by different  means, my way of doing that is easy and
is as follow:

As you may know, the trick is to have asprotect checking the original exe , not the patched one. So
make a copy and change the last letter of its name, if we take dvdfab.exe for example the patched exe
would be dvdfah.exe.

Load the patched exe into ollydbg, follow esp to dump, shift+f9 about 5 times or so, search in dump
for “h.ex” with out the qt., once found make a note of the stack address.

Restart ollydbg, in dump go to the noted address, shift+f9 till you see the string “h.ex”, then Alt+k , double click on the address you see , this is the call we want to loop  right below it , just choose an address the best
fit.

The mission is almost over,  by changing the “h.ex” to “b.ex”, asprotect will swallow the bait.

Now we have all the info needed, we can check for landmarks to guide us through. Will try to make it works on other pcs, so set bp on virtualAlloc , second stop , alt+f9 , you will see three moves storing the eax value
the first one is the base we need , the last one , the one after the fs:[0], is the landmark we need.

Write down the two address you found at [ebp+xxx], Subtract the base from va address for looping, will have the rva needed.

In the initialization phase of the dll , create a thread the checks the landmark address for non zero entry
if true then you can suspend  the main thread , if you want, or just go ahead and add the rva to
base  to get va address to patch to make target loop, if you had suspended the thread resume it now
check the stack address for the string as I indicated above, continue checking the stack address till string found, you can suspend the process thread if you want, change string as I indicated above ,if suspended
resume, now you can pass through asprotect with your dll on board, have your dll check for landmarks
to patch the target exe for anything you desire.[I did not include images because I think it is easy enough].

hoping it may be of any benefit to any of you.

Kind Regards !
BriteDream.
谁译一下
2005-3-4 10:49
0
雪    币: 427
活跃值: (412)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
3
看不太明白 This is not really a tutorial
2005-3-4 10:59
0
雪    币: 196
活跃值: (2162)
能力值: ( LV4,RANK:50 )
在线值:
发帖
回帖
粉丝
4
里面就一个 doc文件就这些内容
2005-3-4 11:01
0
雪    币: 201
活跃值: (15)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
5
Crk on exetools forum provided

http://rapidshare.de/files/652827/Magic_NetTrace_v2.5.5_Crack.zip.html
2005-3-4 11:26
0
雪    币: 427
活跃值: (412)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
6
最初由 newpp 发布
Crk on exetools forum provided

http://rapidshare.de/files/652827/Magic_NetTrace_v2.5.5_Crack.zip.html


这个我下过,没时间研究。有教学的话,要理解的更好点。
2005-3-4 11:32
0
雪    币: 898
活跃值: (4039)
能力值: ( LV9,RANK:3410 )
在线值:
发帖
回帖
粉丝
7
最初由 鸡蛋壳 发布

这个我下过,没时间研究。有教学的话,要理解的更好点。


少灌点水就有时间研究了
把这个写篇教程?
2005-3-4 11:34
0
雪    币: 242
活跃值: (30)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
8
不?呃???吧。。。
2005-3-4 15:23
0
雪    币: 266
活跃值: (269)
能力值: ( LV9,RANK:210 )
在线值:
发帖
回帖
粉丝
9
理论上完全可行
2005-3-4 16:52
0
雪    币: 99
活跃值: (193)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
10
2005-3-4 20:47
0
雪    币: 420
活跃值: (44)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
11
楼上的看来是很恐怖啊
2005-3-5 09:36
0
雪    币: 255
活跃值: (207)
能力值: ( LV9,RANK:250 )
在线值:
发帖
回帖
粉丝
12
替换法。
2005-3-5 09:58
0
游客
登录 | 注册 方可回帖
返回
//