《今天准备爆破传奇世界大补贴1.47。】
这个外挂加了2个壳。一个是ASP2.12还有一个是。KVJP什么的。
我脱壳之后发现是用Borland Delphi 6.0 - 7.0编写的。
然后就开了W32dasm。去找它的可疑信息。
我觉得应该重2个方面去爆破:
“输入的大补贴用户名称或密码有误”
从这句话入手。
还有一个就是不让他实现网络验证。(这个可以不去爆破,这个如果也解决了就应该是完美的了)
但是找死人都是找不到这2个东西。尤其是“输入的大补贴用户名称或密码有误
”它调用了一个DLL。(WOOL.dll.)
但是我去找“输入的大补贴用户名称或密码有误”也是找不到。它里面放的都是一些游戏里面的东西。
本人很菜。希望有人能指点一二。首先不通过密码验证这关。下面的又有何用?
下载地址:http://dbt999.com/woool/dbt999_47.exe
:004711F3 83FEF9 cmp esi, FFFFFFF9
:004711F6 EB0B jmp 00471203
:004711F8 8BD6 mov edx, esi
:004711FA 8BC3 mov eax, ebx
:004711FC E8EB1B0000 call 00472DEC
:00471201 33F6 xor esi, esi
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004711F6(U)
|
:00471203 85F6 test esi, esi
:00471205 0F8C3D010000 jl 00471348
:0047120B 33D2 xor edx, edx
:0047120D 8B83BC040000 mov eax, dword ptr [ebx+000004BC]
:00471213 E82CF2FCFF call 00440444
:00471218 8B83C0040000 mov eax, dword ptr [ebx+000004C0]
:0047121E 8B10 mov edx, dword ptr [eax]
:00471220 FF92C8000000 call dword ptr [edx+000000C8]
:00471226 8B15F0704700 mov edx, dword ptr [004770F0]
:0047122C 8B12 mov edx, dword ptr [edx]
:0047122E 8802 mov byte ptr [edx], al
:00471230 8B45FC mov eax, dword ptr [ebp-04]
:00471233 E87837F9FF call 004049B0
:00471238 50 push eax
:00471239 8B83DC040000 mov eax, dword ptr [ebx+000004DC]
:0047123F E86C37F9FF call 004049B0
:00471244 50 push eax
:00471245 8BC3 mov eax, ebx
:00471247 E8B059FDFF call 00446BFC
:0047124C 50 push eax
:0047124D FF156C8E4700 call dword ptr [00478E6C]
:00471253 8D45F4 lea eax, dword ptr [ebp-0C]
* Possible StringData Ref from Code Obj ->"登录成功!"
:004712C4 B83C144700 mov eax, 0047143C
:004712C9 E85E84F9FF call 0040972C
:004712CE 8B55DC mov edx, dword ptr [ebp-24]
:004712D1 8D45F4 lea eax, dword ptr [ebp-0C]
:004712D4 E8AF32F9FF call 00404588
:004712D9 EB45 jmp 00471320
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0047128F(C)
|
:004712DB 8B8348030000 mov eax, dword ptr [ebx+00000348]
:004712E1 8B10 mov edx, dword ptr [eax]
:004712E3 FF92CC000000 call dword ptr [edx+000000CC]
:004712E9 83F802 cmp eax, 00000002
:004712EC 7532 jne 00471320
:004712EE 8D45C8 lea eax, dword ptr [ebp-38]
:004712F1 50 push eax
:004712F2 8B45F4 mov eax, dword ptr [ebp-0C]
:004712F5 8945CC mov dword ptr [ebp-34], eax
:004712F8 C645D00B mov [ebp-30], 0B
:004712FC 8975D4 mov dword ptr [ebp-2C], esi
:004712FF C645D800 mov [ebp-28], 00
:00471303 8D55CC lea edx, dword ptr [ebp-34]
:00471306 B901000000 mov ecx, 00000001
* Possible StringData Ref from Code Obj ->"%s
您的大补帖用户帐户剩余 %d "
[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)