首页
社区
课程
招聘
用ARM给98的记事本加了壳,脱出来出问题了。
2004-8-2 23:26 3966

用ARM给98的记事本加了壳,脱出来出问题了。

2004-8-2 23:26
3966
用ARM随便加了一下,脱出来的文件遇到问题了, IAT修复了,但文件运行出错不知道怎么修复,请指点一下小弟。

附加壳的记事本 和脱出来的已修复IAT的文件。
点击下载:附件!jiake.rar

点击下载:附件!dumped_.rar

[CTF入门培训]顶尖高校博士及硕士团队亲授《30小时教你玩转CTF》,视频+靶场+题目!助力进入CTF世界

收藏
点赞1
打赏
分享
最新回复 (10)
雪    币: 217
活跃值: (70)
能力值: ( LV4,RANK:50 )
在线值:
发帖
回帖
粉丝
zhlgame 1 2004-8-3 07:17
2
0
第一个没法下载
雪    币: 250
活跃值: (105)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
baby 2004-8-3 21:08
3
0
已修复连接,请老兄们看看
雪    币: 250
活跃值: (105)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
baby 2004-8-11 22:27
4
0
这样就没人能脱了吗?
雪    币: 200
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
stephenteh 2004-8-12 07:54
5
0
this mprogram protected by copymemII and code splicing...

unpack the program using the copymemII method and dump the "stolen code" from memory and add a new section...remember to edit the the virtual address...
example: the "stolen code" is at address 15c0000 then u have to minus the imagebase which is 400000 then the virtual address is 11c0000...

here is the unpack exe..i have optimized the program

附件:dumped_.rar
雪    币: 250
活跃值: (105)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
baby 2004-8-12 10:47
6
0
请问如何找回丢失的代码 ? 我还是不明白:(
雪    币: 200
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
stephenteh 2004-8-12 10:54
7
0
1)use lordpe dump the region of the "stolen code"
2)open the dumped exe with lordpe -> section-> load section..choose the dumped region
3)now edit the virtual address(see the example above)
4) now save the file, open lordpe again go option and ONLY ticked "Validate PE", and rebuild the dumped exe
5)now fix the IAT........
6)optimize the program after removed some useless section left by armadillo.

btw... have to dump the region of stolen code and exe at the same time because everytime u start the program the "stolen code" will be at different address....

understood???
雪    币: 250
活跃值: (105)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
baby 2004-8-12 22:11
8
0
1)use lordpe dump the region of the "stolen code"
如何定位在哪个部位?
雪    币: 250
活跃值: (105)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
baby 2004-8-12 22:15
9
0
在看雪的加密解密光盘里找了一个dll也用ARM加了个壳, 用常规的方法也是脱不了。。

附件:cw3220.rar
雪    币: 200
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
stephenteh 2004-8-12 22:34
10
0
最初由 baby 发布
1)use lordpe dump the region of the "stolen code"
如何定位在哪个部位?


to find the location of the "stolen code".... the way i used is load the dumped.exe after fixing the IAT.. then scroll to top of the program or press Home key on ur keyboard...
then search for binary string "E9" (u have to keep searching until u find some very far jump...example for the "stolen code" of the program i unpacked is at 15c0000

004011AA  - E9 51EE1B01     JMP dumped_.015C0000 <-- different from ur computer...
004011AF    F7D2            NOT EDX
004011B1    87FF            XCHG EDI,EDI
004011B3    57              PUSH EDI
004011B4    5F              POP EDI
004011B5    F7D2            NOT EDX

15c0000 is the start of the "stolen code" use lordpe dump this region and add it at the back of the exe and edit the virtual address to 15c0000 - 400000 = 11c0000

understood???

btw.. dll is a lot more difficult to unpack then exe...i cannot unpack the dll u attached..
雪    币: 250
活跃值: (105)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
baby 2004-8-14 14:35
11
0
我的英文水平太低了,哪位大哥翻译一下,再次表示感谢。
游客
登录 | 注册 方可回帖
返回