-
-
暴破论坛上的dcse的过程
-
发表于: 2006-7-10 14:45 3618
-
菜鸟看不懂汇编的语法,所以无法找出算法,所有暴破
采用的以下的过程暴破
1,运行一下exe,输入taomedia,PAss:123456\
点一下,提示:注册失败...
2,打开ASM,查找注册失败,好,找到,记着0045392A
3,打开OD,CTRL+G,找到这一个点,往下看,发现,0045396A,
0045392A |> \8BC6 mov eax, esi
0045392C |. F7EE imul esi
0045392E |. 8945 EC mov [ebp-14], eax
00453931 |. DB45 EC fild dword ptr [ebp-14]
00453934 |. DB45 F8 fild dword ptr [ebp-8]
00453937 |. DEF9 fdivp st(1), st
00453939 |. E8 DEEFFAFF call 0040291C
0045393E |. 8BF0 mov esi, eax
00453940 |. 8D55 E8 lea edx, [ebp-18]
00453943 |. 8B45 FC mov eax, [ebp-4]
00453946 |. 8B80 08030000 mov eax, [eax+308]
0045394C |. E8 FBF0FDFF call 00432A4C
00453951 |. 8B45 E8 mov eax, [ebp-18]
00453954 |. 50 push eax
00453955 |. 8D55 E4 lea edx, [ebp-1C]
00453958 |. 8BC6 mov eax, esi
0045395A |. E8 8143FBFF call 00407CE0
0045395F |. 8B55 E4 mov edx, [ebp-1C]
00453962 |. 58 pop eax
00453963 |. E8 F008FBFF call 00404258
00453968 75 0C jnz short 00453976
发现00453968 JNZ
好,反JNZ改为JZ,
保存为desc2.exe
运行,些时随便输入用户名,密码,只要不是正确的就都显示:注册成功...
好暴破完成
采用的以下的过程暴破
1,运行一下exe,输入taomedia,PAss:123456\
点一下,提示:注册失败...
2,打开ASM,查找注册失败,好,找到,记着0045392A
3,打开OD,CTRL+G,找到这一个点,往下看,发现,0045396A,
0045392A |> \8BC6 mov eax, esi
0045392C |. F7EE imul esi
0045392E |. 8945 EC mov [ebp-14], eax
00453931 |. DB45 EC fild dword ptr [ebp-14]
00453934 |. DB45 F8 fild dword ptr [ebp-8]
00453937 |. DEF9 fdivp st(1), st
00453939 |. E8 DEEFFAFF call 0040291C
0045393E |. 8BF0 mov esi, eax
00453940 |. 8D55 E8 lea edx, [ebp-18]
00453943 |. 8B45 FC mov eax, [ebp-4]
00453946 |. 8B80 08030000 mov eax, [eax+308]
0045394C |. E8 FBF0FDFF call 00432A4C
00453951 |. 8B45 E8 mov eax, [ebp-18]
00453954 |. 50 push eax
00453955 |. 8D55 E4 lea edx, [ebp-1C]
00453958 |. 8BC6 mov eax, esi
0045395A |. E8 8143FBFF call 00407CE0
0045395F |. 8B55 E4 mov edx, [ebp-1C]
00453962 |. 58 pop eax
00453963 |. E8 F008FBFF call 00404258
00453968 75 0C jnz short 00453976
发现00453968 JNZ
好,反JNZ改为JZ,
保存为desc2.exe
运行,些时随便输入用户名,密码,只要不是正确的就都显示:注册成功...
好暴破完成
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课
赞赏
看原图
赞赏
雪币:
留言: