能力值:
( LV9,RANK:850 )
|
-
-
4 楼
多谢,你是修改了Enable属性!
提供的注册码是有用的,只是有个Timer的作用,只能用粘帖的方法!
注册码也是不能手动输入的,我本意立求它的实战意义!
爆破很容易,但是也要注意对注册名长度,注册码长度的限制。
再修炼……
以下是一个大大的比较循环!!!!!
0043ECC0 FF15 38104000 call dword ptr ds:[<&MSVBVM60.__vbaV>; MSVBVM60.__vbaVarForInit
0043ECC6 85C0 test eax,eax
0043ECC8 0F84 4C020000 je crackme2.0043EF1A
0043ECCE 8D95 04FFFFFF lea edx,dword ptr ss:[ebp-FC]
0043ECD4 8D8D 34FFFFFF lea ecx,dword ptr ss:[ebp-CC]
0043ECDA C785 2CFFFFFF 01000>mov dword ptr ss:[ebp-D4],1
0043ECE4 899D 24FFFFFF mov dword ptr ss:[ebp-DC],ebx
0043ECEA C785 0CFFFFFF 70C44>mov dword ptr ss:[ebp-F4],crackme2.0>; UNICODE "wofan[OCN]"
0043ECF4 C785 04FFFFFF 08000>mov dword ptr ss:[ebp-FC],8
0043ECFE FF15 D0104000 call dword ptr ds:[<&MSVBVM60.__vbaV>; MSVBVM60.__vbaVarDup
0043ED04 8D95 24FFFFFF lea edx,dword ptr ss:[ebp-DC]
0043ED0A 8D45 CC lea eax,dword ptr ss:[ebp-34]
0043ED0D 52 push edx
0043ED0E 50 push eax
0043ED0F FF15 C4104000 call dword ptr ds:[<&MSVBVM60.__vbaI>; MSVBVM60.__vbaI4Var
0043ED15 8D8D 34FFFFFF lea ecx,dword ptr ss:[ebp-CC]
0043ED1B 50 push eax
0043ED1C 8D95 14FFFFFF lea edx,dword ptr ss:[ebp-EC]
0043ED22 51 push ecx
0043ED23 52 push edx
0043ED24 FF15 5C104000 call dword ptr ds:[<&MSVBVM60.#632>] ; MSVBVM60.rtcMidCharVar 取字符ASCII
0043ED2A 8D85 14FFFFFF lea eax,dword ptr ss:[ebp-EC]
0043ED30 8D8D 48FFFFFF lea ecx,dword ptr ss:[ebp-B8]
0043ED36 50 push eax
0043ED37 51 push ecx
0043ED38 FF15 94104000 call dword ptr ds:[<&MSVBVM60.__vbaS>; MSVBVM60.__vbaStrVarVal 字串转数值
0043ED3E 50 push eax
0043ED3F FF15 20104000 call dword ptr ds:[<&MSVBVM60.#516>] ; MSVBVM60.rtcAnsiValueBstr
0043ED45 8D95 E4FEFFFF lea edx,dword ptr ss:[ebp-11C]
0043ED4B 8D8D 6CFFFFFF lea ecx,dword ptr ss:[ebp-94]
0043ED51 66:8985 ECFEFFFF mov word ptr ss:[ebp-114],ax
0043ED58 899D E4FEFFFF mov dword ptr ss:[ebp-11C],ebx
0043ED5E FFD7 call edi
0043ED60 8B1D FC104000 mov ebx,dword ptr ds:[<&MSVBVM60.__v>; MSVBVM60.__vbaFreeStr
0043ED66 8D8D 48FFFFFF lea ecx,dword ptr ss:[ebp-B8]
0043ED6C FFD3 call ebx
0043ED6E 8D95 14FFFFFF lea edx,dword ptr ss:[ebp-EC]
0043ED74 8D85 24FFFFFF lea eax,dword ptr ss:[ebp-DC]
0043ED7A 52 push edx
0043ED7B 8D8D 34FFFFFF lea ecx,dword ptr ss:[ebp-CC]
0043ED81 50 push eax
0043ED82 51 push ecx
0043ED83 6A 03 push 3
0043ED85 FFD6 call esi
0043ED87 8B95 7CFFFFFF mov edx,dword ptr ss:[ebp-84]
0043ED8D 8B45 80 mov eax,dword ptr ss:[ebp-80]
0043ED90 83C4 10 add esp,10
0043ED93 8995 0CFFFFFF mov dword ptr ss:[ebp-F4],edx
0043ED99 8D8D 04FFFFFF lea ecx,dword ptr ss:[ebp-FC]
0043ED9F 8985 10FFFFFF mov dword ptr ss:[ebp-F0],eax
0043EDA5 8D95 6CFFFFFF lea edx,dword ptr ss:[ebp-94]
0043EDAB 51 push ecx
0043EDAC 8D85 34FFFFFF lea eax,dword ptr ss:[ebp-CC]
0043EDB2 52 push edx
0043EDB3 50 push eax
0043EDB4 C785 04FFFFFF 05000>mov dword ptr ss:[ebp-FC],5
0043EDBE FF15 D4104000 call dword ptr ds:[<&MSVBVM60.__vbaV>; MSVBVM60.__vbaVarMod 求余函数
0043EDC4 8D4D CC lea ecx,dword ptr ss:[ebp-34]
0043EDC7 50 push eax
0043EDC8 8D95 24FFFFFF lea edx,dword ptr ss:[ebp-DC]
0043EDCE 51 push ecx
0043EDCF 52 push edx
0043EDD0 FF15 C8104000 call dword ptr ds:[<&MSVBVM60.__vbaV>; MSVBVM60.__vbaVarAdd 加函数
0043EDD6 8BD0 mov edx,eax
0043EDD8 8D8D 5CFFFFFF lea ecx,dword ptr ss:[ebp-A4]
0043EDDE FFD7 call edi
0043EDE0 8B45 84 mov eax,dword ptr ss:[ebp-7C]
0043EDE3 8D95 04FFFFFF lea edx,dword ptr ss:[ebp-FC]
0043EDE9 8D8D 34FFFFFF lea ecx,dword ptr ss:[ebp-CC]
0043EDEF C785 2CFFFFFF 01000>mov dword ptr ss:[ebp-D4],1
0043EDF9 C785 24FFFFFF 02000>mov dword ptr ss:[ebp-DC],2
0043EE03 8985 0CFFFFFF mov dword ptr ss:[ebp-F4],eax
0043EE09 C785 04FFFFFF 08000>mov dword ptr ss:[ebp-FC],8
0043EE13 FF15 D0104000 call dword ptr ds:[<&MSVBVM60.__vbaV>; MSVBVM60.__vbaVarDup
0043EE19 8D8D 24FFFFFF lea ecx,dword ptr ss:[ebp-DC]
0043EE1F 8D55 CC lea edx,dword ptr ss:[ebp-34]
0043EE22 51 push ecx
0043EE23 52 push edx
0043EE24 FF15 C4104000 call dword ptr ds:[<&MSVBVM60.__vbaI>; MSVBVM60.__vbaI4Var
0043EE2A 50 push eax
0043EE2B 8D85 34FFFFFF lea eax,dword ptr ss:[ebp-CC]
0043EE31 8D8D 14FFFFFF lea ecx,dword ptr ss:[ebp-EC]
0043EE37 50 push eax
0043EE38 51 push ecx
0043EE39 FF15 5C104000 call dword ptr ds:[<&MSVBVM60.#632>] ; MSVBVM60.rtcMidCharVar 取字串函数
0043EE3F 8D95 14FFFFFF lea edx,dword ptr ss:[ebp-EC]
0043EE45 8D85 48FFFFFF lea eax,dword ptr ss:[ebp-B8]
0043EE4B 52 push edx
0043EE4C 50 push eax
0043EE4D FF15 94104000 call dword ptr ds:[<&MSVBVM60.__vbaS>; MSVBVM60.__vbaStrVarVal
0043EE53 50 push eax
0043EE54 FF15 20104000 call dword ptr ds:[<&MSVBVM60.#516>] ; MSVBVM60.rtcAnsiValueBstr
0043EE5A 8D95 E4FEFFFF lea edx,dword ptr ss:[ebp-11C]
0043EE60 8D8D 4CFFFFFF lea ecx,dword ptr ss:[ebp-B4]
0043EE66 66:8985 ECFEFFFF mov word ptr ss:[ebp-114],ax
0043EE6D C785 E4FEFFFF 02000>mov dword ptr ss:[ebp-11C],2
0043EE77 FFD7 call edi
0043EE79 8D8D 48FFFFFF lea ecx,dword ptr ss:[ebp-B8]
0043EE7F FFD3 call ebx
0043EE81 8D8D 14FFFFFF lea ecx,dword ptr ss:[ebp-EC]
0043EE87 8D95 24FFFFFF lea edx,dword ptr ss:[ebp-DC]
0043EE8D 51 push ecx
0043EE8E 8D85 34FFFFFF lea eax,dword ptr ss:[ebp-CC]
0043EE94 52 push edx
0043EE95 50 push eax
0043EE96 6A 03 push 3
0043EE98 FFD6 call esi
0043EE9A 83C4 10 add esp,10
0043EE9D 8D8D 5CFFFFFF lea ecx,dword ptr ss:[ebp-A4]
0043EEA3 8D95 4CFFFFFF lea edx,dword ptr ss:[ebp-B4]
0043EEA9 51 push ecx
0043EEAA 52 push edx
0043EEAB FF15 C0104000 call dword ptr ds:[<&MSVBVM60.__vbaV>; MSVBVM60.__vbaVarTstNe 比较函数
0043EEB1 66:85C0 test ax,ax
0043EEB4 75 22 jnz short crackme2.0043EED8 这里改一下,Nop 掉,一样爆破成功!真丢人!
0043EEB6 8D85 78FEFFFF lea eax,dword ptr ss:[ebp-188]
0043EEBC 8D8D 88FEFFFF lea ecx,dword ptr ss:[ebp-178]
0043EEC2 50 push eax
0043EEC3 8D55 CC lea edx,dword ptr ss:[ebp-34]
0043EEC6 51 push ecx
0043EEC7 52 push edx
0043EEC8 FF15 F0104000 call dword ptr ds:[<&MSVBVM60.__vbaV>; MSVBVM60.__vbaVarForNext for next 大循环
0043EECE BB 02000000 mov ebx,2
0043EED3 ^ E9 EEFDFFFF jmp crackme2.0043ECC6
虽然没有出现明码,可是一样爆破成功,Crackme制作失败!!!!!
wofan[OCN]
1:34 2005-3-13
我很悲伤,还得加倍努力,还没有想到防爆的方法,一个Crackme不能防爆,等于没用!!!不管你的算法有多复杂……
|
能力值:
( LV2,RANK:10 )
|
-
-
8 楼
学习学习,随便rr的问下,请问,那截图是用的虾米软件么?
|
能力值:
( LV2,RANK:10 )
|
-
-
9 楼
最初由 Saver 发布 学习学习,随便rr的问下,请问,那截图是用的虾米软件么?
snagit什么的都可以。
|