首页
社区
课程
招聘
17
[分享]IDA BETA 9.0 crack
发表于: 2024-8-10 13:36 18359

[分享]IDA BETA 9.0 crack

2024-8-10 13:36
18359

IDA BETA 9.0 crack

下载链接

win patch方法

  1. 用010 Editor修改ida64.dll,0x342D8B 75->74
  2. 新建一个ida.hexlic,填入如下内容
1
{"header":{"version":1},"payload":{"name":"test","email":"test","licenses":[{"id":"0C-2238-4E5A-7B","product":"IDA","owner":"0C-2238-4E5A-0A","license_type":"named","seats":1,"add_ons":[{"id":"0C-2238-4E5A-01","code":"HEXX86","owner":"0C-2238-4E5A-0A","start_date":"2024-08-08 08:08:08","end_date":"2034-08-08 08:08:08"},{"id":"0C-2238-4E5A-02","code":"HEXX64","owner":"0C-2238-4E5A-0A","start_date":"2024-08-08 08:08:08","end_date":"2034-08-08 08:08:08"},{"id":"0C-2238-4E5A-03","code":"HEXARM","owner":"0C-2238-4E5A-0A","start_date":"2024-08-08 08:08:08","end_date":"2034-08-08 08:08:08"},{"id":"0C-2238-4E5A-04","code":"HEXARM64","owner":"0C-2238-4E5A-0A","start_date":"2024-08-08 08:08:08","end_date":"2034-08-08 08:08:08"},{"id":"0C-2238-4E5A-05","code":"HEXMIPS","owner":"0C-2238-4E5A-0A","start_date":"2024-08-08 08:08:08","end_date":"2034-08-08 08:08:08"},{"id":"0C-2238-4E5A-06","code":"HEXMIPS64","owner":"0C-2238-4E5A-0A","start_date":"2024-08-08 08:08:08","end_date":"2034-08-08 08:08:08"},{"id":"0C-2238-4E5A-07","code":"HEXPPC","owner":"0C-2238-4E5A-0A","start_date":"2024-08-08 08:08:08","end_date":"2034-08-08 08:08:08"},{"id":"0C-2238-4E5A-08","code":"HEXPPC64","owner":"0C-2238-4E5A-0A","start_date":"2024-08-08 08:08:08","end_date":"2034-08-08 08:08:08"},{"id":"0C-2238-4E5A-09","code":"HEXRV64","owner":"0C-2238-4E5A-0A","start_date":"2024-08-08 08:08:08","end_date":"2034-08-08 08:08:08"},{"id":"0C-2238-4E5A-10","code":"HEXARC","owner":"0C-2238-4E5A-0A","start_date":"2024-08-08 08:08:08","end_date":"2034-08-08 08:08:08"},{"id":"0C-2238-4E5A-11","code":"HEXARC64","owner":"0C-2238-4E5A-0A","start_date":"2024-08-08 08:08:08","end_date":"2034-08-08 08:08:08"}],"features":[],"start_date":"2024-08-08 08:08:08","issued_on":"2024-08-08 08:08:08","end_date":"2034-08-08 08:08:08"}]}}

来源:

补充

其他平台的crack脚本,自行尝试
来源: https://x.com/__alula/status/1822106728630034776

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
import json
import hashlib
import os
 
license = {
    "header": {"version": 1},
    "payload": {
        "name": "meow :3",
        "email": "hi@hex-rays.com",
        "licenses": [
            {
                "id": "48-2137-ACAB-99",
                "license_type": "named",
                "product": "IDA",
                "seats": 1,
                "start_date": "2024-08-10 00:00:00",
                "end_date": "2033-12-31 23:59:59"# This can't be more than 10 years!
                "issued_on": "2024-08-10 00:00:00",
                "owner": "cracked by alula :3",
                "add_ons": [
                    # {
                    #     "id": "48-1337-DEAD-01",
                    #     "code": "HEXX86L",
                    #     "owner": "48-0000-0000-00",
                    #     "start_date": "2024-08-10 00:00:00",
                    #     "end_date": "2033-12-31 23:59:59",
                    # },
                    # {
                    #     "id": "48-1337-DEAD-02",
                    #     "code": "HEXX64L",
                    #     "owner": "48-0000-0000-00",
                    #     "start_date": "2024-08-10 00:00:00",
                    #     "end_date": "2033-12-31 23:59:59",
                    # },
                ],
                "features": [],
            }
        ],
    },
}
 
 
def add_every_addon(license):
    platforms = [
        "W"# Windows
        "L"# Linux
        "M"# macOS
    ]
    addons = [
        "HEXX86",
        "HEXX64",
        "HEXARM",
        "HEXARM64",
        "HEXMIPS",
        "HEXMIPS64",
        "HEXPPC",
        "HEXPPC64",
        "HEXRV64",
        "HEXARC",
        "HEXARC64",
        # Probably cloud?
        # "HEXCX86",
        # "HEXCX64",
        # "HEXCARM",
        # "HEXCARM64",
        # "HEXCMIPS",
        # "HEXCMIPS64",
        # "HEXCPPC",
        # "HEXCPPC64",
        # "HEXCRV",
        # "HEXCRV64",
        # "HEXCARC",
        # "HEXCARC64",
    ]
 
    i = 0
    for addon in addons:
        i += 1
        license["payload"]["licenses"][0]["add_ons"].append(
            {
                "id": f"48-1337-DEAD-{i:02}",
                "code": addon,
                "owner": license["payload"]["licenses"][0]["id"],
                "start_date": "2024-08-10 00:00:00",
                "end_date": "2033-12-31 23:59:59",
            }
        )
    # for addon in addons:
    #     for platform in platforms:
    #         i += 1
    #         license["payload"]["licenses"][0]["add_ons"].append(
    #             {
    #                 "id": f"48-1337-DEAD-{i:02}",
    #                 "code": addon + platform,
    #                 "owner": license["payload"]["licenses"][0]["id"],
    #                 "start_date": "2024-08-10 00:00:00",
    #                 "end_date": "2033-12-31 23:59:59",
    #             }
    #         )
 
 
add_every_addon(license)
 
 
def json_stringify_alphabetical(obj):
    return json.dumps(obj, sort_keys=True, separators=(",", ":"))
 
 
def buf_to_bigint(buf):
    return int.from_bytes(buf, byteorder="little")
 
 
def bigint_to_buf(i):
    return i.to_bytes((i.bit_length() + 7) // 8, byteorder="little")
 
 
# Yup, you only have to patch 5c -> cb in libida64.so
pub_modulus_hexrays = buf_to_bigint(
    bytes.fromhex(
        "edfd425cf978546e8911225884436c57140525650bcf6ebfe80edbc5fb1de68f4c66c29cb22eb668788afcb0abbb718044584b810f8970cddf227385f75d5dddd91d4f18937a08aa83b28c49d12dc92e7505bb38809e91bd0fbd2f2e6ab1d2e33c0c55d5bddd478ee8bf845fcef3c82b9d2929ecb71f4d1b3db96e3a8e7aaf93"
    )
)
pub_modulus_patched = buf_to_bigint(
    bytes.fromhex(
        "edfd42cbf978546e8911225884436c57140525650bcf6ebfe80edbc5fb1de68f4c66c29cb22eb668788afcb0abbb718044584b810f8970cddf227385f75d5dddd91d4f18937a08aa83b28c49d12dc92e7505bb38809e91bd0fbd2f2e6ab1d2e33c0c55d5bddd478ee8bf845fcef3c82b9d2929ecb71f4d1b3db96e3a8e7aaf93"
    )
)
 
private_key = buf_to_bigint(
    bytes.fromhex(
        "77c86abbb7f3bb134436797b68ff47beb1a5457816608dbfb72641814dd464dd640d711d5732d3017a1c4e63d835822f00a4eab619a2c4791cf33f9f57f9c2ae4d9eed9981e79ac9b8f8a411f68f25b9f0c05d04d11e22a3a0d8d4672b56a61f1532282ff4e4e74759e832b70e98b9d102d07e9fb9ba8d15810b144970029874"
    )
)
 
 
def decrypt(message):
    decrypted = pow(buf_to_bigint(message), exponent, pub_modulus_patched)
    decrypted = bigint_to_buf(decrypted)
    return decrypted[::-1]
 
 
def encrypt(message):
    encrypted = pow(buf_to_bigint(message[::-1]), private_key, pub_modulus_patched)
    encrypted = bigint_to_buf(encrypted)
    return encrypted
 
 
exponent = 0x13
 
 
def sign_hexlic(payload: dict) -> str:
    data = {"payload": payload}
    data_str = json_stringify_alphabetical(data)
 
    buffer = bytearray(128)
    # first 33 bytes are random
    for i in range(33):
        buffer[i] = 0x42
 
    # compute sha256 of the data
    sha256 = hashlib.sha256()
    sha256.update(data_str.encode())
    digest = sha256.digest()
 
    # copy the sha256 digest to the buffer
    for i in range(32):
        buffer[33 + i] = digest[i]
 
    # encrypt the buffer
    encrypted = encrypt(buffer)
 
    return encrypted.hex().upper()
 
 
def generate_patched_dll(filename):
    if not os.path.exists(filename):
        print(f"Didn't find {filename}, skipping patch generation")
        return
 
    with open(filename, "rb") as f:
        data = f.read()
 
        if data.find(bytes.fromhex("EDFD42CBF978")) != -1:
            print(f"{filename} looks to be already patched :)")
            return
         
        if data.find(bytes.fromhex("EDFD425CF978")) == -1:
            print(f"{filename} doesn't contain the original modulus.")
            return
 
        data = data.replace(
            bytes.fromhex("EDFD425CF978"), bytes.fromhex("EDFD42CBF978")
        )
 
        patched_filename = f"{filename}.patched"
        with open(patched_filename, "wb") as f:
            f.write(data)
 
        print(f"Generated modulus patch to {patched_filename}! To apply the patch, replace the original file with the patched file")
 
 
# message = bytes.fromhex(license["signature"])
# print(decrypt(message).hex())
# print(encrypt(decrypt(message)).hex())
 
license["signature"] = sign_hexlic(license["payload"])
 
serialized = json_stringify_alphabetical(license)
 
# write to ida.hexlic
filename = "ida.hexlic"
 
with open(filename, "w") as f:
    f.write(serialized)
 
print(f"Saved new license to {filename}!")
 
generate_patched_dll("ida.dll")
generate_patched_dll("ida64.dll")
generate_patched_dll("libida.so")
generate_patched_dll("libida64.so")
generate_patched_dll("libida.dylib")
generate_patched_dll("libida64.dylib")

[招生]系统0day安全-IOT设备漏洞挖掘(第6期)!

最后于 2024-8-10 14:03 被TubituX编辑 ,原因: 修改
收藏
免费 17
支持
分享
赞赏记录
参与人
雪币
留言
时间
LanYunDev
感谢你的积极参与,期待更多精彩内容!
2024-8-17 00:33
jzhr
+1
感谢你的积极参与,期待更多精彩内容!
2024-8-13 21:08
dryzh
+2
非常支持你的观点!
2024-8-12 17:12
poppig
+1
谢谢分享
2024-8-12 16:43
你瞒我瞒
感谢你的积极参与,期待更多精彩内容!
2024-8-12 10:56
sanduo
+1
你的帖子非常有用,感谢分享!
2024-8-12 09:19
mark马克
期待更多优质内容的分享,论坛有你更精彩!
2024-8-12 07:58
tank小王子
+6
感谢你分享这么好的资源!
2024-8-11 16:57
秋狝
为你点赞~
2024-8-10 23:54
yuanyouran
+1
这个讨论对我很有帮助,谢谢!
2024-8-10 21:12
奋斗小菜鸟
+1
你的帖子非常有用,感谢分享!
2024-8-10 17:48
nevinhappy
+1
感谢你分享这么好的资源!
2024-8-10 17:21
Csome
过年了
2024-8-10 15:03
墨穹呢
你的帖子非常有用,感谢分享!
2024-8-10 14:11
wusha
+1
为你点赞~
2024-8-10 14:08
PangBai
+1
感谢你分享这么好的资源!
2024-8-10 13:55
bananaships
非常支持你的观点!
2024-8-10 13:51
最新回复 (24)
雪    币: 924
活跃值: (201)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
2
过年啦
2024-8-10 13:40
1
雪    币: 2438
活跃值: (3342)
能力值: ( LV3,RANK:20 )
在线值:
发帖
回帖
粉丝
3

过年说是。打不开下载链接的用这个链接

最后于 2024-8-10 14:22 被墨穹呢编辑 ,原因:
2024-8-10 14:07
0
雪    币: 439
活跃值: (1493)
能力值: ( LV3,RANK:20 )
在线值:
发帖
回帖
粉丝
4
Linux x86_64 0x4A2DA7: E9 CF FB FF FF => E9 84 FF FF FF
2024-8-10 16:06
0
雪    币: 22
活跃值: (893)
能力值: ( LV5,RANK:60 )
在线值:
发帖
回帖
粉丝
5
maco好用
2024-8-10 16:12
0
雪    币: 4032
活跃值: (3296)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
6
66666  这是提前过年了
2024-8-10 17:48
0
雪    币: 8
活跃值: (807)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
7
Process:               ida64 [6110]
Path:                  /Applications/IDA Professional 9.0.app/Contents/MacOS/ida64
Identifier:            com.hexrays.ida64
Version:               9.0.240807 (240807)
Code Type:             X86-64 (Native)
Parent Process:        zsh [6076]
Responsible:           Terminal [598]
User ID:               501

Date/Time:             2024-08-10 17:46:33.8302 +0800
OS Version:            macOS 13.6.9 (22G830)
Report Version:        12
Anonymous UUID:        5C160960-6E31-426D-7FFE-FDE99BC47A5B


Time Awake Since Boot: 720 seconds

System Integrity Protection: enabled

Crashed Thread:        0  Dispatch queue: com.apple.main-thread

Exception Type:        EXC_BAD_ACCESS (SIGSEGV)
Exception Codes:       KERN_INVALID_ADDRESS at 0x00007ff8a507f341
Exception Codes:       0x0000000000000001, 0x00007ff8a507f341

Termination Reason:    Namespace SIGNAL, Code 11 Segmentation fault: 11
Terminating Process:   exc handler [6110]
 有兄弟遇见这个bug吗
2024-8-10 17:49
0
雪    币: 7538
活跃值: (3582)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
8
没有插件,可惜
2024-8-10 18:00
0
雪    币: 426
活跃值: (1919)
能力值: ( LV6,RANK:80 )
在线值:
发帖
回帖
粉丝
9
有没有intelmac成功的!!!
2024-8-10 19:04
0
雪    币: 1220
活跃值: (159)
能力值: ( LV3,RANK:25 )
在线值:
发帖
回帖
粉丝
10
dextoart Process: ida64 [6110] Path: /Applications/IDA Professional 9.0.app/C ...
有解决吗?
2024-8-10 20:43
0
雪    币: 109
活跃值: (369)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
11
有人下载到 tilib90 么? 
2024-8-10 20:53
0
雪    币: 8
活跃值: (807)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
12
明丶大 有解决吗?
签名结束后,可以解决部分crash,但是有些样本加载会crash
sudo codesign --force --deep --sign - /Applications/IDA\ Professional\ 9.0.app/Contents/MacOS/libida.dylib
sudo codesign --force --deep --sign - /Applications/IDA\ Professional\ 9.0.app/Contents/MacOS/libida64.dylib
2024-8-10 20:56
1
雪    币: 1014
活跃值: (651)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
13
过年了过年了 等大佬做个整合版
2024-8-10 22:18
0
雪    币: 20
能力值: ( LV1,RANK:0 )
在线值:
发帖
回帖
粉丝
14
各位大佬,你们能安装使用   LazyIDA  与   keypatch 插件吗
2024-8-10 23:40
0
雪    币: 1140
活跃值: (3371)
能力值: ( LV12,RANK:385 )
在线值:
发帖
回帖
粉丝
15

2024-8-10 23:41
0
雪    币: 7648
活跃值: (4890)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
16
有哪些新功能?
2024-8-11 07:36
0
雪    币: 2186
活跃值: (4847)
能力值: ( LV6,RANK:90 )
在线值:
发帖
回帖
粉丝
17
提前过年??!
2024-8-11 08:49
0
雪    币: 1505
活跃值: (4132)
能力值: ( LV3,RANK:30 )
在线值:
发帖
回帖
粉丝
18

签名文件合集中 signatures-bundles-9.0-beta.zip 压缩包没有解压密码。

lumina_teams90_x64linux.run 是如何使用的?创建自己的lumina服务器

最后于 2024-8-11 20:45 被方向感编辑 ,原因:
2024-8-11 20:43
0
雪    币: 13488
活跃值: (9775)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
19
下载页面竟然还能访问。。。
hex-rays不知道这是想啥呢。是不是没看x还是怎么,不会是学PortSwigger直接把BurpSuite公开下载,奢望有人买key吧。
2024-8-12 10:45
0
雪    币: 439
活跃值: (1363)
能力值: ( LV3,RANK:30 )
在线值:
发帖
回帖
粉丝
20
方向感 签名文件合集中 signatures-bundles-9.0-beta.zip 压缩包没有解压密码。lumina_teams90_x64linux.run 是如何使 ...
https://github.com/kimci86/bkcrack

bkcrack -C signatures-bundles-9.0-beta.zip -k 7d396e83 b1c59666 08ae3e65 -D signatures-bundles-9.0-beta_nopass.zip
2024-8-12 12:49
1
雪    币: 210
能力值: ( LV1,RANK:0 )
在线值:
发帖
回帖
粉丝
21
已经不能下载了,苦于没有linux ida pro破解
2024-8-12 15:52
0
雪    币: 8
活跃值: (807)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
22
BlackBosy 已经不能下载了,苦于没有linux ida pro破解


2024-8-12 17:46
0
雪    币: 210
能力值: ( LV1,RANK:0 )
在线值:
发帖
回帖
粉丝
23
dextoart
感谢
2024-8-12 23:05
0
雪    币: 1505
活跃值: (4132)
能力值: ( LV3,RANK:30 )
在线值:
发帖
回帖
粉丝
24
猫子 https://github.com/kimci86/bkcrack bkcrack -C signatures-bundles-9.0-beta.zip -k 7d396e83 b1c5966 ...
谢谢,
2024-8-12 23:46
0
雪    币: 213
活跃值: (507)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
25

pub_modulus_hexrays =   "edfd425cf978546e8911225884436c57140525650bcf6ebfe80edbc5fb1de68f4c66c29cb22eb668788afcb0abbb718044584b810f8970cddf227385f75d5dddd91d4f18937a08aa83b28c49d12dc92e7505bb38809e91bd0fbd2f2e6ab1d2e33c0c55d5bddd478ee8bf845fcef3c82b9d2929ecb71f4d1b3db96e3a8e7aaf93" 

 pub_modulus_patched =   "edfd42cbf978546e8911225884436c57140525650bcf6ebfe80edbc5fb1de68f4c66c29cb22eb668788afcb0abbb718044584b810f8970cddf227385f75d5dddd91d4f18937a08aa83b28c49d12dc92e7505bb38809e91bd0fbd2f2e6ab1d2e33c0c55d5bddd478ee8bf845fcef3c82b9d2929ecb71f4d1b3db96e3a8e7aaf93" 


破解文件RSA公钥与原版秘钥区别只有一个字节怎么做到的

2024-8-13 21:03
0
游客
登录 | 注册 方可回帖
返回

账号登录
验证码登录

忘记密码?
没有账号?立即免费注册