(首先感谢看雪老大指导小弟如何搜索汉字)这是小弟初学“OllyDBG 入门系列(二)-字串参考 ”的试练,请高人指点一二,不妥及失误之处望鉴谅!
该软件为DELPHI所写,也不知小弟试练的这个软件是不是太复杂了),注册窗口为有两行,一行是硬件序列号:四个字符一组共两组,中间用“-“相连。
第二行为四个文本框,每个文本框可输入四个字符(字母、数字不限)。
0073A5C8 /. 55 PUSH EBP
0073A5C9 |. 8BEC MOV EBP,ESP
0073A5CB |. B9 06000000 MOV ECX,6
0073A5D0 |> 6A 00 /PUSH 0
0073A5D2 |. 6A 00 |PUSH 0
0073A5D4 |. 49 |DEC ECX
0073A5D5 |.^75 F9 \JNZ SHORT xksoft.0073A5D0
0073A5D7 |. 53 PUSH EBX
0073A5D8 |. 56 PUSH ESI
0073A5D9 |. 8BD8 MOV EBX,EAX
0073A5DB |. 33C0 XOR EAX,EAX
0073A5DD |. 55 PUSH EBP
0073A5DE |. 68 C2A77300 PUSH xksoft.0073A7C2
0073A5E3 |. 64:FF30 PUSH DWORD PTR FS:[EAX]
0073A5E6 |. 64:8920 MOV DWORD PTR FS:[EAX],ESP
0073A5E9 |. 8D55 EC LEA EDX,DWORD PTR SS:[EBP-14]
0073A5EC |. 8B83 08030000 MOV EAX,DWORD PTR DS:[EBX+308]
0073A5F2 |. E8 1152E5FF CALL xksoft.0058F808
0073A5F7 |. 8B45 EC MOV EAX,DWORD PTR SS:[EBP-14]
0073A5FA |. E8 95A4CCFF CALL xksoft.00404A94 ; 0073A5FF |. 83F8 04 CMP EAX,4
0073A602 |. 75 51 JNZ SHORT xksoft.0073A655 ;
0073A604 |. 8D55 E8 LEA EDX,DWORD PTR SS:[EBP-18]
0073A607 |. 8B83 0C030000 MOV EAX,DWORD PTR DS:[EBX+30C]
0073A60D |. E8 F651E5FF CALL xksoft.0058F808
0073A612 |. 8B45 E8 MOV EAX,DWORD PTR SS:[EBP-18]
0073A615 |. E8 7AA4CCFF CALL xksoft.00404A94 ;同0
0073A61A |. 83F8 04 CMP EAX,4
0073A61D |. 75 36 JNZ SHORT xksoft.0073A655 ;
0073A61F |. 8D55 E4 LEA EDX,DWORD PTR SS:[EBP-1C]
0073A622 |. 8B83 10030000 MOV EAX,DWORD PTR DS:[EBX+310]
0073A628 |. E8 DB51E5FF CALL xksoft.0058F808
0073A62D |. 8B45 E4 MOV EAX,DWORD PTR SS:[EBP-1C]
0073A630 |. E8 5FA4CCFF CALL xksoft.00404A94 ;同0
0073A635 |. 83F8 04 CMP EAX,4
0073A638 |. 75 1B JNZ SHORT xksoft.0073A655 ;
0073A63A |. 8D55 E0 LEA EDX,DWORD PTR SS:[EBP-20]
0073A63D |. 8B83 14030000 MOV EAX,DWORD PTR DS:[EBX+314]
0073A643 |. E8 C051E5FF CALL xksoft.0058F808
0073A648 |. 8B45 E0 MOV EAX,DWORD PTR SS:[EBP-20]
0073A64B |. E8 44A4CCFF CALL xksoft.00404A94 ;同0
0073A650 |. 83F8 04 CMP EAX,4
0073A653 |. 74 0F JE SHORT xksoft.0073A664
0073A655 |> B8 D8A77300 MOV EAX,xksoft.0073A7D8 ;
0073A65A |. E8 B122FAFF CALL xksoft.006DC910
0073A65F |. E9 43010000 JMP xksoft.0073A7A7
0073A664 |> 8D45 FC LEA EAX,DWORD PTR SS:[EBP-4] ;
0073A667 |. E8 E019FFFF CALL xksoft.0072C04C
0073A66C |. 8D55 F8 LEA EDX,DWORD PTR SS:[EBP-8]
0073A66F |. 8B45 FC MOV EAX,DWORD PTR SS:[EBP-4]
0073A672 |. E8 B11EFFFF CALL xksoft.0072C528
0073A677 |. 8D55 DC LEA EDX,DWORD PTR SS:[EBP-24]
0073A67A |. 8B83 08030000 MOV EAX,DWORD PTR DS:[EBX+308]
0073A680 |. E8 8351E5FF CALL xksoft.0058F808
0073A685 |. FF75 DC PUSH DWORD PTR SS:[EBP-24]
0073A688 |. 8D55 D8 LEA EDX,DWORD PTR SS:[EBP-28]
0073A68B |. 8B83 0C030000 MOV EAX,DWORD PTR DS:[EBX+30C]
0073A691 |. E8 7251E5FF CALL xksoft.0058F808
0073A696 |. FF75 D8 PUSH DWORD PTR SS:[EBP-28]
0073A699 |. 8D55 D4 LEA EDX,DWORD PTR SS:[EBP-2C]
0073A69C |. 8B83 10030000 MOV EAX,DWORD PTR DS:[EBX+310]
0073A6A2 |. E8 6151E5FF CALL xksoft.0058F808
0073A6A7 |. FF75 D4 PUSH DWORD PTR SS:[EBP-2C]
0073A6AA |. 8D55 D0 LEA EDX,DWORD PTR SS:[EBP-30]
0073A6AD |. 8B83 14030000 MOV EAX,DWORD PTR DS:[EBX+314]
0073A6B3 |. E8 5051E5FF CALL xksoft.0058F808
0073A6B8 |. FF75 D0 PUSH DWORD PTR SS:[EBP-30]
0073A6BB |. 8D45 F4 LEA EAX,DWORD PTR SS:[EBP-C]
0073A6BE |. BA 04000000 MOV EDX,4
0073A6C3 |. E8 8CA4CCFF CALL xksoft.00404B54
0073A6C8 |. 8B45 F8 MOV EAX,DWORD PTR SS:[EBP-8]
0073A6CB |. 8B55 F4 MOV EDX,DWORD PTR SS:[EBP-C]
0073A6CE |. E8 0DA5CCFF CALL xksoft.00404BE0 ;
0073A6D3 |. 74 0F JE SHORT xksoft.0073A6E4
0073A6D5 |. B8 D8A77300 MOV EAX,xksoft.0073A7D8 ;
0073A6DA |. E8 3122FAFF CALL xksoft.006DC910
0073A6DF |. E9 C3000000 JMP xksoft.0073A7A7
0073A6E4 |> B2 01 MOV DL,1
0073A6E6 |. A1 90464500 MOV EAX,DWORD PTR DS:[454690]
0073A6EB |. E8 64A1D1FF CALL xksoft.00454854
0073A6F0 |. 8BF0 MOV ESI,EAX
0073A6F2 |. BA 02000080 MOV EDX,80000002
0073A6F7 |. 8BC6 MOV EAX,ESI
0073A6F9 |. E8 86A2D1FF CALL xksoft.00454984
0073A6FE |. 8D45 F0 LEA EAX,DWORD PTR SS:[EBP-10]
0073A701 |. BA F0A77300 MOV EDX,xksoft.0073A7F0 ; ASCII " "
0073A706 |. E8 51A1CCFF CALL xksoft.0040485C
0073A70B |. B1 01 MOV CL,1
0073A70D |. 8B55 F0 MOV EDX,DWORD PTR SS:[EBP-10]
0073A710 |. 8BC6 MOV EAX,ESI
0073A712 |. E8 21A4D1FF CALL xksoft.00454B38
0073A717 |. 84C0 TEST AL,AL
0073A719 |. 74 18 JE SHORT xksoft.0073A733
0073A71B |. 8B4D F4 MOV ECX,DWORD PTR SS:[EBP-C]
0073A71E |. BA 14A87300 MOV EDX,xksoft.0073A814 ; ASCII " "
0073A723 |. 8BC6 MOV EAX,ESI
0073A725 |. E8 C2A8D1FF CALL xksoft.00454FEC
0073A72A |. 8BC6 MOV EAX,ESI
0073A72C |. E8 07A2D1FF CALL xksoft.00454938
0073A731 |. EB 13 JMP SHORT xksoft.0073A746
0073A733 |> 8BC6 MOV EAX,ESI
0073A735 |. E8 7691CCFF CALL xksoft.004038B0
0073A73A |. B8 20A87300 MOV EAX,xksoft.0073A820
0073A73F |. E8 CC21FAFF CALL xksoft.006DC910
0073A744 |. EB 61 JMP SHORT xksoft.0073A7A7
0073A746 |> 8BC6 MOV EAX,ESI
0073A748 |. E8 6391CCFF CALL xksoft.004038B0
0073A74D |. B8 38A87300 MOV EAX,xksoft.0073A838
0073A752 |. E8 B921FAFF CALL xksoft.006DC910
0073A757 |. BA 50A87300 MOV EDX,xksoft.0073A850
0073A75C |. A1 E8F67500 MOV EAX,DWORD PTR DS:[75F6E8]
0073A761 |. E8 FA5ED5FF CALL xksoft.00490660
0073A766 |. 33D2 XOR EDX,EDX
0073A768 |. 8B83 08030000 MOV EAX,DWORD PTR DS:[EBX+308]
0073A76E |. 8B08 MOV ECX,DWORD PTR DS:[EAX]
0073A770 |. FF51 64 CALL DWORD PTR DS:[ECX+64]
0073A773 |. 33D2 XOR EDX,EDX
0073A775 |. 8B83 0C030000 MOV EAX,DWORD PTR DS:[EBX+30C]
0073A77B |. 8B08 MOV ECX,DWORD PTR DS:[EAX]
0073A77D |. FF51 64 CALL DWORD PTR DS:[ECX+64]
0073A780 |. 33D2 XOR EDX,EDX
0073A782 |. 8B83 10030000 MOV EAX,DWORD PTR DS:[EBX+310]
0073A788 |. 8B08 MOV ECX,DWORD PTR DS:[EAX]
0073A78A |. FF51 64 CALL DWORD PTR DS:[ECX+64]
0073A78D |. 33D2 XOR EDX,EDX
0073A78F |. 8B83 14030000 MOV EAX,DWORD PTR DS:[EBX+314]
0073A795 |. 8B08 MOV ECX,DWORD PTR DS:[EAX]
0073A797 |. FF51 64 CALL DWORD PTR DS:[ECX+64]
0073A79A |. 33D2 XOR EDX,EDX
0073A79C |. 8B83 F8020000 MOV EAX,DWORD PTR DS:[EBX+2F8]
0073A7A2 |. 8B08 MOV ECX,DWORD PTR DS:[EAX]
0073A7A4 |. FF51 64 CALL DWORD PTR DS:[ECX+64]
0073A7A7 |> 33C0 XOR EAX,EAX
0073A7A9 |. 5A POP EDX
0073A7AA |. 59 POP ECX
0073A7AB |. 59 POP ECX
0073A7AC |. 64:8910 MOV DWORD PTR FS:[EAX],EDX
0073A7AF |. 68 C9A77300 PUSH xksoft.0073A7C9
0073A7B4 |> 8D45 D0 LEA EAX,DWORD PTR SS:[EBP-30]
0073A7B7 |. BA 0C000000 MOV EDX,0C
0073A7BC |. E8 27A0CCFF CALL xksoft.004047E8
0073A7C1 \. C3 RETN
[课程]Linux pwn 探索篇!