这是一段drclient的DrAuthSvr.ll的一段代码,想问一下怎么样跳过windows_check_proxy检测?
怎么没人回复,难道是我代码贴的不全?求解释~~还是没高手看到?
004C023B CC int3
004C023C CC int3
004C023D CC int3
004C023E CC int3
004C023F CC int3
004C0240 51 push ecx
004C0241 A1 B0A95100 mov eax, dword ptr [51A9B0]
004C0246 53 push ebx
004C0247 56 push esi
004C0248 57 push edi
004C0249 33FF xor edi, edi
004C024B 3BC7 cmp eax, edi
004C024D 74 0E je short 004C025D
004C024F 57 push edi
004C0250 50 push eax
004C0251 FF15 58814D00 call dword ptr [<&KERNEL32.TerminateT>; kernel32.TerminateThread
004C0257 893D B0A95100 mov dword ptr [51A9B0], edi
004C025D 68 18010000 push 118
004C0262 E8 CD1DFDFF call 00492034
004C0267 8BF0 mov esi, eax
004C0269 68 FF000000 push 0FF
004C026E 8D46 0C lea eax, dword ptr [esi+C]
004C0271 68 A41F5100 push 00511FA4 ; windows_check_proxy
004C0276 50 push eax
004C0277 C706 70004C00 mov dword ptr [esi], 004C0070 ; vwj
004C027D 897E 04 mov dword ptr [esi+4], edi
004C0280 897E 08 mov dword ptr [esi+8], edi
004C0283 E8 481FFDFF call 004921D0
004C0288 83C4 10 add esp, 10
004C028B 8D4C24 0C lea ecx, dword ptr [esp+C]
004C028F 51 push ecx
004C0290 57 push edi
004C0291 56 push esi
004C0292 68 80164D00 push 004D1680
004C0297 57 push edi
004C0298 57 push edi
004C0299 897C24 24 mov dword ptr [esp+24], edi
004C029D FF15 48814D00 call dword ptr [<&KERNEL32.CreateThre>; kernel32.CreateThread
004C02A3 8BF0 mov esi, eax
004C02A5 3BF7 cmp esi, edi
004C02A7 77 2F ja short 004C02D8
004C02A9 FF15 88814D00 call dword ptr [<&KERNEL32.GetLastErr>; ntdll.RtlGetLastWin32Error
004C02AF 3BC7 cmp eax, edi
004C02B1 74 25 je short 004C02D8
004C02B3 50 push eax
004C02B4 68 A41F5100 push 00511FA4 ; windows_check_proxy
004C02B9 BB E43D5100 mov ebx, 00513DE4 ; [%s] 线程创建失败, 错误代码: %d!!!
004C02BE E8 9D9AFFFF call 004B9D60
004C02C3 50 push eax
004C02C4 E8 C7F00000 call 004CF390
004C02C9 83C4 0C add esp, 0C
004C02CC 5F pop edi
004C02CD 33C0 xor eax, eax
004C02CF 5E pop esi
004C02D0 A3 B0A95100 mov dword ptr [51A9B0], eax
004C02D5 5B pop ebx
004C02D6 59 pop ecx
004C02D7 C3 retn
004C02D8 56 push esi
004C02D9 68 183E5100 push 00513E18 ; not wait
004C02DE 68 A41F5100 push 00511FA4 ; windows_check_proxy
004C02E3 BB 243E5100 mov ebx, 00513E24 ; [%s] 线程创建成功(%s), handle %08x
004C02E8 E8 739AFFFF call 004B9D60
004C02ED 50 push eax
004C02EE E8 2DE60000 call 004CE920
004C02F3 83C4 10 add esp, 10
004C02F6 5F pop edi
004C02F7 8935 B0A95100 mov dword ptr [51A9B0], esi
004C02FD 5E pop esi
004C02FE 5B pop ebx
004C02FF 59 pop ecx
004C0300 C3 retn
004C0301 CC int3
004C0302 CC int3
004C0303 CC int3
004C0304 CC int3
004C0305 CC int3
004C0306 CC int3
004C0307 CC int3
004C0308 CC int3
请问怎么样跳过windows_check_proxy?
求解~~
[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)