能力值:
( LV2,RANK:10 )
3 楼
Quick statistical test of module 'CrackMe' reports that its code
section is either compressed, encrypted, or contains large amount of
embedded data. results of code analysis can be very unreliable or
simply wrong. Do you want to continue analysis? 代码段加密,压缩了吗?
我把它一放进ollydbg就有上面的提示,这怎么办啊
能力值:
( LV9,RANK:170 )
5 楼
无奈,抗调试的壳......
PEID只看到 ARVID's TDR file *
能力值:
( LV3,RANK:30 )
10 楼
如果你要测试你的程序和你写的壳能不能抗调试,请不要把算法拉得那么常,我没全数统计
就是计算的过程,M 长的过程,加上 N 多的循环,你叫人有力去跟吗,把反汇编出来的代码我想可以帖上。。。。。。。。。。。。。。。。。。。。。。。。还没完
还有我想告诉你,你的 anti debug 是基本没用的
能力值:
( LV2,RANK:10 )
12 楼
也许楼兄错误理解我写这个CrackMe的目的了,我完全是从保护软件的角度上来写这个CrackMe的,保护软件的最终目的是在没有注册的情况下,不允许使用软件的关键功能。当然,我也没有要求兄弟们写出注册机来,只要有谁能看出这个动画的运作过程,就说明这个保护已经失去作用了。
另外,多谢楼兄批评指点,我的anti debug确实是没啥用处,纯粹是捣乱一下. (小弟刚刚接触破解这一行,对于anti debug了解确实不多,高手见笑了)
希望兄弟们继续加油,早日能看到这个动画!
能力值:
( LV2,RANK:10 )
16 楼
有了realKey,那么像版主这样的高手破解起来岂不太简单了,再说,当初小弟写引CM时,并没有考虑事先会给出realKey的情况,这方面考虑会有所不周全,所以,小弟还是想如果确实无人能破,再给出注册机和注册算法,请版主见谅!
另:此CM应该在是可以在Windows各个版本下运行的,XP的SP1版本下肯定可以运行,小弟机子的版本就是XP的SP1版本
能力值:
( LV2,RANK:10 )
17 楼
有了realKey,那么像版主这样的高手破解起来岂不太简单了,再说,当初小弟写此CM时,并没有考虑事先会给出realKey的情况,这方面考虑会有所不周全,所以,小弟还是想如果确实无人能破,再给出注册机和注册算法,请版主见谅!
另:此CM应该在是可以在Windows各个版本下运行的,XP的SP1版本下肯定可以运行,小弟机子的版本就是XP的SP1版本
能力值:
( LV12,RANK:2670 )
19 楼
00407FA4 > 55 push ebp ; OEP?
00407FA5 8BEC mov ebp,esp
00407FA7 6A FF push -1
00407FA9 68 C09F4000 push Dumped_.00409FC0
00407FAE 68 2A814000 push Dumped_.0040812A
00407FB3 64:A1 00000000 mov eax,dword ptr fs:[0]
00407FB9 50 push eax
00407FBA 64:8925 00000000 mov dword ptr fs:[0],esp
00407FC1 83EC 68 sub esp,68
00407FC4 53 push ebx
00407FC5 56 push esi
00407FC6 57 push edi
00407FC7 8965 E8 mov dword ptr ss:[ebp-18],esp
00407FCA 33DB xor ebx,ebx
00402260 55 push ebp ; 算法开始?
00402261 8BEC mov ebp,esp
00402263 6A FF push -1
00402265 68 D0854000 push Dumped_.004085D0
0040226A 64:A1 00000000 mov eax,dword ptr fs:[0]
00402270 50 push eax
00402271 64:8925 00000000 mov dword ptr fs:[0],esp
00402278 83EC 10 sub esp,10
0040227B 53 push ebx
0040227C 56 push esi
0040227D 57 push edi
0040227E 8BD9 mov ebx,ecx
00402280 FF15 44D44000 call dword ptr ds:[40D444]
00402286 68 00010000 push 100
0040228B FF15 34D44000 call dword ptr ds:[40D434]
00402291 8BF8 mov edi,eax
00402293 897D E8 mov dword ptr ss:[ebp-18],edi
00402296 83C4 04 add esp,4
00402299 68 00010000 push 100
0040229E FF15 34D44000 call dword ptr ds:[40D434]
004022A4 8945 EC mov dword ptr ss:[ebp-14],eax
004022A7 83C4 04 add esp,4
004022AA FF15 40D44000 call dword ptr ds:[40D440]
004022B0 8D4D F0 lea ecx,dword ptr ss:[ebp-10]
004022B3 E8 A05A0000 call Dumped_.00407D58
004022B8 68 00010000 push 100
004022BD 57 push edi
004022BE 8D8B 400A0000 lea ecx,dword ptr ds:[ebx+A40]
004022C4 C745 FC 00000000 mov dword ptr ss:[ebp-4],0
004022CB E8 065B0000 call Dumped_.00407DD6
004022D0 BE 1CC44000 mov esi,Dumped_.0040C41C
004022D5 8BC7 mov eax,edi
004022D7 8A10 mov dl,byte ptr ds:[eax]
004022D9 8ACA mov cl,dl
004022DB 3A16 cmp dl,byte ptr ds:[esi]
004022DD 75 1C jnz short Dumped_.004022FB
004022DF 84C9 test cl,cl
004022E1 74 14 je short Dumped_.004022F7
004022E3 8A50 01 mov dl,byte ptr ds:[eax+1]
004022E6 8ACA mov cl,dl
004022E8 3A56 01 cmp dl,byte ptr ds:[esi+1]
004022EB 75 0E jnz short Dumped_.004022FB
004022ED 83C0 02 add eax,2
004022F0 83C6 02 add esi,2
004022F3 84C9 test cl,cl
004022F5 ^ 75 E0 jnz short Dumped_.004022D7
004022F7 33C0 xor eax,eax
004022F9 EB 05 jmp short Dumped_.00402300
004022FB 1BC0 sbb eax,eax
004022FD 83D8 FF sbb eax,-1
00402300 85C0 test eax,eax
00402302 0F84 53010000 je Dumped_.0040245B
00402308 8DB3 880A0000 lea esi,dword ptr ds:[ebx+A88]
0040230E 8D8B 000A0000 lea ecx,dword ptr ds:[ebx+A00]
00402314 56 push esi
00402315 E8 6E5A0000 call Dumped_.00407D88
0040231A 8B06 mov eax,dword ptr ds:[esi]
0040231C 8B3D 10934000 mov edi,dword ptr ds:[409310]
00402322 68 1CC44000 push Dumped_.0040C41C
00402327 50 push eax
00402328 FFD7 call edi
0040232A 83C4 08 add esp,8
0040232D 85C0 test eax,eax
0040232F 0F84 26010000 je Dumped_.0040245B
00402335 8D45 F0 lea eax,dword ptr ss:[ebp-10]
00402338 8D8B 20010000 lea ecx,dword ptr ds:[ebx+120]
0040233E 50 push eax
0040233F E8 445A0000 call Dumped_.00407D88
00402344 8B4D F0 mov ecx,dword ptr ss:[ebp-10]
00402347 68 1CC44000 push Dumped_.0040C41C
0040234C 51 push ecx
0040234D FFD7 call edi
0040234F 83C4 08 add esp,8
00402352 85C0 test eax,eax
00402354 0F84 01010000 je Dumped_.0040245B
0040235A 8D55 F0 lea edx,dword ptr ss:[ebp-10]
0040235D 8BCE mov ecx,esi
0040235F 52 push edx
00402360 E8 6B5A0000 call Dumped_.00407DD0
00402365 8D45 F0 lea eax,dword ptr ss:[ebp-10]
00402368 8D8B E0000000 lea ecx,dword ptr ds:[ebx+E0]
0040236E 50 push eax
0040236F E8 145A0000 call Dumped_.00407D88
00402374 8B4D F0 mov ecx,dword ptr ss:[ebp-10]
00402377 68 1CC44000 push Dumped_.0040C41C
0040237C 51 push ecx
0040237D FFD7 call edi
0040237F 83C4 08 add esp,8
00402382 85C0 test eax,eax
00402384 0F84 D1000000 je Dumped_.0040245B
0040238A 8D55 F0 lea edx,dword ptr ss:[ebp-10]
0040238D 8BCE mov ecx,esi
0040238F 52 push edx
00402390 E8 3B5A0000 call Dumped_.00407DD0
00402395 8D45 F0 lea eax,dword ptr ss:[ebp-10]
00402398 8D8B A0000000 lea ecx,dword ptr ds:[ebx+A0]
0040239E 50 push eax
0040239F E8 E4590000 call Dumped_.00407D88
004023A4 8B4D F0 mov ecx,dword ptr ss:[ebp-10]
004023A7 68 1CC44000 push Dumped_.0040C41C
004023AC 51 push ecx
004023AD FFD7 call edi
004023AF 83C4 08 add esp,8
004023B2 85C0 test eax,eax
004023B4 0F84 A1000000 je Dumped_.0040245B
004023BA 8D55 F0 lea edx,dword ptr ss:[ebp-10]
004023BD 8BCE mov ecx,esi
004023BF 52 push edx
004023C0 E8 0B5A0000 call Dumped_.00407DD0
004023C5 8B3E mov edi,dword ptr ds:[esi]
004023C7 83C9 FF or ecx,FFFFFFFF
004023CA 33C0 xor eax,eax
004023CC F2:AE repne scasb
004023CE 8B45 EC mov eax,dword ptr ss:[ebp-14]
004023D1 F7D1 not ecx
004023D3 2BF9 sub edi,ecx
004023D5 8BD1 mov edx,ecx
004023D7 8BF7 mov esi,edi
004023D9 8BF8 mov edi,eax
004023DB C1E9 02 shr ecx,2
004023DE F3:A5 rep movsd
004023E0 8BCA mov ecx,edx
004023E2 83E1 03 and ecx,3
004023E5 F3:A4 rep movsb
004023E7 51 push ecx
004023E8 8BCC mov ecx,esp
004023EA 8965 EC mov dword ptr ss:[ebp-14],esp
004023ED 50 push eax
004023EE E8 D7590000 call Dumped_.00407DCA
004023F3 8B45 E8 mov eax,dword ptr ss:[ebp-18]
004023F6 51 push ecx
004023F7 8BCC mov ecx,esp
004023F9 8965 E4 mov dword ptr ss:[ebp-1C],esp
004023FC 50 push eax
004023FD C645 FC 01 mov byte ptr ss:[ebp-4],1
00402401 E8 C4590000 call Dumped_.00407DCA
00402406 C645 FC 00 mov byte ptr ss:[ebp-4],0
0040240A E8 E14C0000 call Dumped_.004070F0
0040240F 83C4 08 add esp,8
00402412 E8 D9420000 call Dumped_.004066F0
00402417 3D EE44B0DB cmp eax,DBB044EE ; 比较EAX值?3685762286
0040241C 75 09 jnz short Dumped_.00402427
0040241E 8BCB mov ecx,ebx
00402420 E8 4BF2FFFF call Dumped_.00401670
00402425 EB 34 jmp short Dumped_.0040245B
00402427 8B0D 2CC74000 mov ecx,dword ptr ds:[40C72C]
0040242D 8D55 F0 lea edx,dword ptr ss:[ebp-10]
00402430 51 push ecx
00402431 68 54C04000 push Dumped_.0040C054 ; %d
00402436 52 push edx
00402437 E8 82590000 call Dumped_.00407DBE
0040243C 8B45 F0 mov eax,dword ptr ss:[ebp-10]
0040243F 50 push eax
00402440 E8 1B360000 call Dumped_.00405A60
00402445 83C4 10 add esp,10
00402448 8BCB mov ecx,ebx
0040244A 6A 40 push 40
0040244C 68 48C04000 push Dumped_.0040C048 ; 注册错误!
00402451 68 24C04000 push Dumped_.0040C024 ; 没关系,再来一次!\n\n 失败乃成功之母!
00402456 E8 69590000 call Dumped_.00407DC4
0040245B 8D4D F0 lea ecx,dword ptr ss:[ebp-10]
0040245E C745 FC FFFFFFFF mov dword ptr ss:[ebp-4],-1
00402465 E8 F8570000 call Dumped_.00407C62
0040246A 8B4D F4 mov ecx,dword ptr ss:[ebp-C]
0040246D 5F pop edi
0040246E 5E pop esi
0040246F 64:890D 00000000 mov dword ptr fs:[0],ecx
00402476 5B pop ebx
00402477 8BE5 mov esp,ebp
00402479 5D pop ebp
0040247A C3 retn
能力值:
( LV6,RANK:90 )
21 楼
楼主和K哥能否详细些地解释一下?比如加密方法、破解方法步骤等,免得我等小菜还是蒙蒙的。
能力值:
( LV2,RANK:10 )
22 楼
其实,小弟这个CrackMe算法很简单,兄弟们不要被里面的"累死千人的长城代码"吓住了 ... ...
好了,小弟只能透露这么多,因为小弟已夸下海口,七天之内无人能破!
说得太多,让兄弟们提前破了,岂不自扫颜面!
能力值:
( LV6,RANK:90 )
23 楼
谢谢楼主解释!
我连怎么进入K哥贴出来的部分都不知道(这部分应该是脱壳吧?),所以我还以为破了呢!希望7天后楼主给我们分析一下,也希望K哥解释下怎么脱壳。