能力值:
( LV9,RANK:970 )
2 楼
由于上传不了,帖注册机代码。主要部分:
KenGen4CrackMeDlg.cpp
// KenGen4CrackMeDlg.cpp : implementation file
//Coded By NightFox 2006.2.19
#include "stdafx.h"
#include "KenGen4CrackMe.h"
#include "KenGen4CrackMeDlg.h"
#include "BlowFish.h" //BLOWFISH类
#ifdef _DEBUG
#define new DEBUG_NEW
#undef THIS_FILE
static char THIS_FILE[] = __FILE__;
#endif
//以下是用OllyDBG对加密name和productid过程的逆向分析
//SBox直接从内存中Dump出来 位于CrackMe 0x45dbe0 256个DWORD
DWORD dumpmem[256]={
0x00000000 ,0x77073096 ,0xEE0E612C ,0x990951BA,
0x076DC419 ,0x706AF48F ,0xE963A535 ,0x9E6495A3,
0x0EDB8832 ,0x79DCB8A4 ,0xE0D5E91E ,0x97D2D988,
0x09B64C2B ,0x7EB17CBD ,0xE7B82D07 ,0x90BF1D91,
0x1DB71064 ,0x6AB020F2 ,0xF3B97148 ,0x84BE41DE,
0x1ADAD47D ,0x6DDDE4EB ,0xF4D4B551 ,0x83D385C7,
0x136C9856 ,0x646BA8C0 ,0xFD62F97A ,0x8A65C9EC,
0x14015C4F ,0x63066CD9 ,0xFA0F3D63 ,0x8D080DF5,
0x3B6E20C8 ,0x4C69105E ,0xD56041E4 ,0xA2677172,
0x3C03E4D1 ,0x4B04D447 ,0xD20D85FD ,0xA50AB56B,
0x35B5A8FA ,0x42B2986C ,0xDBBBC9D6 ,0xACBCF940,
0x32D86CE3 ,0x45DF5C75 ,0xDCD60DCF ,0xABD13D59,
0x26D930AC ,0x51DE003A ,0xC8D75180 ,0xBFD06116,
0x21B4F4B5 ,0x56B3C423 ,0xCFBA9599 ,0xB8BDA50F,
0x2802B89E ,0x5F058808 ,0xC60CD9B2 ,0xB10BE924,
0x2F6F7C87 ,0x58684C11 ,0xC1611DAB ,0xB6662D3D,
0x76DC4190 ,0x01DB7106 ,0x98D220BC ,0xEFD5102A,
0x71B18589 ,0x06B6B51F ,0x9FBFE4A5 ,0xE8B8D433,
0x7807C9A2 ,0x0F00F934 ,0x9609A88E ,0xE10E9818,
0x7F6A0DBB ,0x086D3D2D ,0x91646C97 ,0xE6635C01,
0x6B6B51F4 ,0x1C6C6162 ,0x856530D8 ,0xF262004E,
0x6C0695ED ,0x1B01A57B ,0x8208F4C1 ,0xF50FC457,
0x65B0D9C6 ,0x12B7E950 ,0x8BBEB8EA ,0xFCB9887C,
0x62DD1DDF ,0x15DA2D49 ,0x8CD37CF3 ,0xFBD44C65,
0x4DB26158 ,0x3AB551CE ,0xA3BC0074 ,0xD4BB30E2,
0x4ADFA541 ,0x3DD895D7 ,0xA4D1C46D ,0xD3D6F4FB,
0x4369E96A ,0x346ED9FC ,0xAD678846 ,0xDA60B8D0,
0x44042D73 ,0x33031DE5 ,0xAA0A4C5F ,0xDD0D7CC9,
0x5005713C ,0x270241AA ,0xBE0B1010 ,0xC90C2086,
0x5768B525 ,0x206F85B3 ,0xB966D409 ,0xCE61E49F,
0x5EDEF90E ,0x29D9C998 ,0xB0D09822 ,0xC7D7A8B4,
0x59B33D17 ,0x2EB40D81 ,0xB7BD5C3B ,0xC0BA6CAD,
0xEDB88320 ,0x9ABFB3B6 ,0x03B6E20C ,0x74B1D29A,
0xEAD54739 ,0x9DD277AF ,0x04DB2615 ,0x73DC1683,
0xE3630B12 ,0x94643B84 ,0x0D6D6A3E ,0x7A6A5AA8,
0xE40ECF0B ,0x9309FF9D ,0x0A00AE27 ,0x7D079EB1,
0xF00F9344 ,0x8708A3D2 ,0x1E01F268 ,0x6906C2FE,
0xF762575D ,0x806567CB ,0x196C3671 ,0x6E6B06E7,
0xFED41B76 ,0x89D32BE0 ,0x10DA7A5A ,0x67DD4ACC,
0xF9B9DF6F ,0x8EBEEFF9 ,0x17B7BE43 ,0x60B08ED5,
0xD6D6A3E8 ,0xA1D1937E ,0x38D8C2C4 ,0x4FDFF252,
0xD1BB67F1 ,0xA6BC5767 ,0x3FB506DD ,0x48B2364B,
0xD80D2BDA ,0xAF0A1B4C ,0x36034AF6 ,0x41047A60,
0xDF60EFC3 ,0xA867DF55 ,0x316E8EEF ,0x4669BE79,
0xCB61B38C ,0xBC66831A ,0x256FD2A0 ,0x5268E236,
0xCC0C7795 ,0xBB0B4703 ,0x220216B9 ,0x5505262F,
0xC5BA3BBE ,0xB2BD0B28 ,0x2BB45A92 ,0x5CB36A04,
0xC2D7FFA7 ,0xB5D0CF31 ,0x2CD99E8B ,0x5BDEAE1D,
0x9B64C2B0 ,0xEC63F226 ,0x756AA39C ,0x026D930A,
0x9C0906A9 ,0xEB0E363F ,0x72076785 ,0x05005713,
0x95BF4A82 ,0xE2B87A14 ,0x7BB12BAE ,0x0CB61B38,
0x92D28E9B ,0xE5D5BE0D ,0x7CDCEFB7 ,0x0BDBDF21,
0x86D3D2D4 ,0xF1D4E242 ,0x68DDB3F8 ,0x1FDA836E,
0x81BE16CD ,0xF6B9265B ,0x6FB077E1 ,0x18B74777,
0x88085AE6 ,0xFF0F6A70 ,0x66063BCA ,0x11010B5C,
0x8F659EFF ,0xF862AE69 ,0x616BFFD3 ,0x166CCF45,
0xA00AE278 ,0xD70DD2EE ,0x4E048354 ,0x3903B3C2,
0xA7672661 ,0xD06016F7 ,0x4969474D ,0x3E6E77DB,
0xAED16A4A ,0xD9D65ADC ,0x40DF0B66 ,0x37D83BF0,
0xA9BCAE53 ,0xDEBB9EC5 ,0x47B2CF7F ,0x30B5FFE9,
0xBDBDF21C ,0xCABAC28A ,0x53B39330 ,0x24B4A3A6,
0xBAD03605 ,0xCDD70693 ,0x54DE5729 ,0x23D967BF,
0xB3667A2E ,0xC4614AB8 ,0x5D681B02 ,0x2A6F2B94,
0xB40BBE37 ,0xC30C8EA1 ,0x5A05DF1B ,0x2D02EF8D
};
//SBox直接从内存中Dump出来 位于CrackMe 0x45dbe0 256个DWORD
//加密过程逆向分析
DWORD EncipherString(char* str)
{
int len=strlen(str);
DWORD result=0xffffffff;
DWORD temp1,temp2;
for(int i=0;i<len;i++)
{
temp1=(DWORD)str[i];
temp2=result;
temp2^=temp1;
temp2=temp2&0xff;
temp1=result;
temp1>>=8;
temp1&=0xffffff;
temp1^=dumpmem[temp2];
result=temp1;
}
result=~result;
return result;;
}
//以上是用OllyDBG对加密name过程的逆向分析
/////////////////////////////////////////////////////////////////////////////
// CAboutDlg dialog used for App About
class CAboutDlg : public CDialog
{
public:
CAboutDlg();
// Dialog Data
//{{AFX_DATA(CAboutDlg)
enum { IDD = IDD_ABOUTBOX };
//}}AFX_DATA
// ClassWizard generated virtual function overrides
//{{AFX_VIRTUAL(CAboutDlg)
protected:
virtual void DoDataExchange(CDataExchange* pDX); // DDX/DDV support
//}}AFX_VIRTUAL
// Implementation
protected:
//{{AFX_MSG(CAboutDlg)
//}}AFX_MSG
DECLARE_MESSAGE_MAP()
};
CAboutDlg::CAboutDlg() : CDialog(CAboutDlg::IDD)
{
//{{AFX_DATA_INIT(CAboutDlg)
//}}AFX_DATA_INIT
}
void CAboutDlg::DoDataExchange(CDataExchange* pDX)
{
CDialog::DoDataExchange(pDX);
//{{AFX_DATA_MAP(CAboutDlg)
//}}AFX_DATA_MAP
}
BEGIN_MESSAGE_MAP(CAboutDlg, CDialog)
//{{AFX_MSG_MAP(CAboutDlg)
// No message handlers
//}}AFX_MSG_MAP
END_MESSAGE_MAP()
/////////////////////////////////////////////////////////////////////////////
// CKenGen4CrackMeDlg dialog
CKenGen4CrackMeDlg::CKenGen4CrackMeDlg(CWnd* pParent /*=NULL*/)
: CDialog(CKenGen4CrackMeDlg::IDD, pParent)
{
//{{AFX_DATA_INIT(CKenGen4CrackMeDlg)
m_strUser = _T("");
m_strSerial = _T("");
//}}AFX_DATA_INIT
// Note that LoadIcon does not require a subsequent DestroyIcon in Win32
m_hIcon = AfxGetApp()->LoadIcon(IDR_MAINFRAME);
}
void CKenGen4CrackMeDlg::DoDataExchange(CDataExchange* pDX)
{
CDialog::DoDataExchange(pDX);
//{{AFX_DATA_MAP(CKenGen4CrackMeDlg)
DDX_Text(pDX, IDC_EDIT1, m_strUser);
DDX_Text(pDX, IDC_EDIT2, m_strSerial);
//}}AFX_DATA_MAP
}
BEGIN_MESSAGE_MAP(CKenGen4CrackMeDlg, CDialog)
//{{AFX_MSG_MAP(CKenGen4CrackMeDlg)
ON_WM_SYSCOMMAND()
ON_WM_PAINT()
ON_WM_QUERYDRAGICON()
ON_EN_CHANGE(IDC_EDIT1, OnChangeEdit1)
//}}AFX_MSG_MAP
END_MESSAGE_MAP()
/////////////////////////////////////////////////////////////////////////////
// CKenGen4CrackMeDlg message handlers
BOOL CKenGen4CrackMeDlg::OnInitDialog()
{
CDialog::OnInitDialog();
// Add "About..." menu item to system menu.
// IDM_ABOUTBOX must be in the system command range.
ASSERT((IDM_ABOUTBOX & 0xFFF0) == IDM_ABOUTBOX);
ASSERT(IDM_ABOUTBOX < 0xF000);
CMenu* pSysMenu = GetSystemMenu(FALSE);
if (pSysMenu != NULL)
{
CString strAboutMenu;
strAboutMenu.LoadString(IDS_ABOUTBOX);
if (!strAboutMenu.IsEmpty())
{
pSysMenu->AppendMenu(MF_SEPARATOR);
pSysMenu->AppendMenu(MF_STRING, IDM_ABOUTBOX, strAboutMenu);
}
}
// Set the icon for this dialog. The framework does this automatically
// when the application's main window is not a dialog
SetIcon(m_hIcon, TRUE); // Set big icon
SetIcon(m_hIcon, FALSE); // Set small icon
// TODO: Add extra initialization here
return TRUE; // return TRUE unless you set the focus to a control
}
void CKenGen4CrackMeDlg::OnSysCommand(UINT nID, LPARAM lParam)
{
if ((nID & 0xFFF0) == IDM_ABOUTBOX)
{
CAboutDlg dlgAbout;
dlgAbout.DoModal();
}
else
{
CDialog::OnSysCommand(nID, lParam);
}
}
// If you add a minimize button to your dialog, you will need the code below
// to draw the icon. For MFC applications using the document/view model,
// this is automatically done for you by the framework.
void CKenGen4CrackMeDlg::OnPaint()
{
if (IsIconic())
{
CPaintDC dc(this); // device context for painting
SendMessage(WM_ICONERASEBKGND, (WPARAM) dc.GetSafeHdc(), 0);
// Center icon in client rectangle
int cxIcon = GetSystemMetrics(SM_CXICON);
int cyIcon = GetSystemMetrics(SM_CYICON);
CRect rect;
GetClientRect(&rect);
int x = (rect.Width() - cxIcon + 1) / 2;
int y = (rect.Height() - cyIcon + 1) / 2;
// Draw the icon
dc.DrawIcon(x, y, m_hIcon);
}
else
{
CDialog::OnPaint();
}
}
// The system calls this to obtain the cursor to display while the user drags
// the minimized window.
HCURSOR CKenGen4CrackMeDlg::OnQueryDragIcon()
{
return (HCURSOR) m_hIcon;
}
void CKenGen4CrackMeDlg::OnOK()
{
// TODO: Add extra validation here
CAboutDlg dlg;
dlg.DoModal();
//CDialog::OnOK();
}
void CKenGen4CrackMeDlg::OnChangeEdit1()
{
// TODO: If this is a RICHEDIT control, the control will not
// send this notification unless you override the CDialog::OnInitDialog()
// function and call CRichEditCtrl().SetEventMask()
// with the ENM_CHANGE flag ORed into the mask.
// TODO: Add your control notification handler code here
UpdateData(TRUE);
if(m_strUser=="")
{
m_strSerial="";
UpdateData(FALSE);
return;
}
//获得ProductID
char produtid[256]="\0";
HKEY hSubkey;
LONG nValue=RegOpenKeyEx(HKEY_LOCAL_MACHINE,"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\",0,KEY_READ,&hSubkey);
if(nValue!=ERROR_SUCCESS)
{
return;
}
else
{
//ZeroMemory(data,256);
DWORD type_2=REG_SZ;//定义数据类型
DWORD cbData_2=80;//定义数据长度
LONG rt=RegQueryValueEx(hSubkey,"ProductId",NULL,&type_2,(LPBYTE)produtid,&cbData_2);
if(rt!=ERROR_SUCCESS)
{
return;
}
}
//获得ProductID
//char serial[]="76481-640-4179232-23767";
DWORD ret1=EncipherString((LPSTR)(LPCSTR)m_strUser); //加密name
DWORD ret2=EncipherString(produtid); //加密productid
CBlowFish blowfish;
DWORD left=0; //BLOWFISH加密的左DWORD
DWORD right=ret1^ret2; //BLOWFISH加密的右DWORD 由ret1^ret2得到
//blowfish.Blowfish_encipher(&left,&right);
char key[]="kernel32.dll"; //BLOWFISH的密钥KEY
blowfish.Initialize((BYTE*)key,0xc); //KEY初始化
blowfish.Blowfish_encipher(&left,&right); //加密
CString temp1;
CString temp2;
temp1.Format("%X",left);
temp2.Format("%X",right);
m_strSerial=temp1+temp2;
UpdateData(FALSE);
}