Delphi、C高手速成V3.0 这个黑客基地破解教程第三课的内容 讲解师只说了脱壳 我是初学者 想尝试破解找出真的注册码 可没有头绪 用ASCII查找错误信息 断点试过 没有关键CALL和跳转 实在解决不了 请好心朋友指点
脱壳后Borland Delphi 6.0 - 7.0
OD载入 ASCII查找错误提示代码如下
00526751 C3 retn
00526752 0000 add byte ptr ds:[eax],al
00526754 68 7474703A push 0x3A707474
00526759 2F das
0052675A 2F das
0052675B 77 77 ja short 1.005267D4
0052675D 77 2E ja short 1.0052678D
0052675F 73 6F jnb short 1.005267D0
00526761 - 66:74 72 je short 000067D6
00526764 65: prefix gs:
00526765 67:2E:636F 6D arpl word ptr cs:[bx+0x6D],bp
0052676A 2E:636E 2F arpl word ptr cs:[esi+0x2F],bp
0052676E 73 68 jnb short 1.005267D8
00526770 61 popad
00526771 72 65 jb short 1.005267D8
00526773 77 61 ja short 1.005267D6
00526775 72 65 jb short 1.005267DC
00526777 5F pop edi
00526778 76 69 jbe short 1.005267E3
0052677A 65:77 2E ja short 1.005267AB
0052677D 61 popad
0052677E 73 70 jnb short 1.005267F0
00526780 3F aas
00526781 69643D 2F 35344>imul esp,dword ptr ss:[ebp+edi+0x2F],0x3>
00526789 42 inc edx
0052678A 313430 xor dword ptr ds:[eax+esi],esi
0052678D 2D 35433339 sub eax,0x39334335
00526792 2D 34443141 sub eax,0x41314434
00526797 2D 39303943 sub eax,0x43393039
0052679C 2D 39423831 sub eax,0x31384239
005267A1 3832 cmp byte ptr ds:[edx],dh
005267A3 383444 cmp byte ptr ss:[esp+eax*2],dh
005267A6 3345 30 xor eax,dword ptr ss:[ebp+0x30]
005267A9 2F das
005267AA 2372 65 and esi,dword ptr ds:[edx+0x65]
005267AD 67:66:6F outs dx,word ptr es:[di]
005267B0 72 6D jb short 1.0052681F
005267B2 0000 add byte ptr ds:[eax],al
005267B4 6F outs dx,dword ptr es:[edi]
005267B5 70 65 jo short 1.0052681C
005267B7 6E outs dx,byte ptr es:[edi]
005267B8 0000 add byte ptr ds:[eax],al
005267BA 0000 add byte ptr ds:[eax],al
005267BC B8 D0675200 mov eax,1.005267D0 ; 注册码错误
005267C1 E8 22E1F0FF call 1.004348E8
005267C6 C3 retn
005267C7 00FF add bh,bh
005267C9 FFFF ??? ; 未知命令
给点思路吧 新手多谢了
[课程]Android-CTF解题方法汇总!