程序脱壳后用OD载入后,0061C82A处是注册失败的位置,0061C78C是注册成功的位置.本人是菜鸟,几天也没有找到爆破的位置,请好心的朋友分析
0061C5B4 . 00 ascii 0
0061C5B5 00 db 00
0061C5B6 00 db 00
0061C5B7 00 db 00
0061C5B8 . 53 push ebx
0061C5B9 . 8BDA mov ebx, edx
0061C5BB . 8BD3 mov edx, ebx
0061C5BD . E8 9680E8FF call 004A4658
0061C5C2 . 814B 08 00000>or dword ptr [ebx+8], 40000
0061C5C9 . 33C0 xor eax, eax
0061C5CB . 8943 1C mov dword ptr [ebx+1C], eax
0061C5CE . 5B pop ebx
0061C5CF . C3 retn
0061C5D0 . 55 push ebp
0061C5D1 . 8BEC mov ebp, esp
0061C5D3 . B9 06000000 mov ecx, 6
0061C5D8 > 6A 00 push 0
0061C5DA . 6A 00 push 0
0061C5DC . 49 dec ecx
0061C5DD .^ 75 F9 jnz short 0061C5D8
0061C5DF . 53 push ebx
0061C5E0 . 56 push esi
0061C5E1 . 57 push edi
0061C5E2 . 8945 FC mov dword ptr [ebp-4], eax
0061C5E5 . 33C0 xor eax, eax
0061C5E7 . 55 push ebp
0061C5E8 . 68 8FC86100 push 0061C88F
0061C5ED . 64:FF30 push dword ptr fs:[eax]
0061C5F0 . 64:8920 mov dword ptr fs:[eax], esp
0061C5F3 . 8D55 F0 lea edx, dword ptr [ebp-10]
0061C5F6 . 8B45 FC mov eax, dword ptr [ebp-4]
0061C5F9 . 8B80 30030000 mov eax, dword ptr [eax+330]
0061C5FF . E8 90C3E6FF call 00488994
0061C604 . 8B45 F0 mov eax, dword ptr [ebp-10]
0061C607 . 8D55 F8 lea edx, dword ptr [ebp-8]
0061C60A . E8 D5D9DEFF call 00409FE4
0061C60F . 8D55 EC lea edx, dword ptr [ebp-14]
0061C612 . 8B45 FC mov eax, dword ptr [ebp-4]
0061C615 . 8B80 34030000 mov eax, dword ptr [eax+334]
0061C61B . E8 74C3E6FF call 00488994
0061C620 . 8B45 EC mov eax, dword ptr [ebp-14]
0061C623 . 8D55 F4 lea edx, dword ptr [ebp-C]
0061C626 . E8 B9D9DEFF call 00409FE4
0061C62B . 33C0 xor eax, eax
0061C62D . 55 push ebp
0061C62E . 68 11C86100 push 0061C811
0061C633 . 64:FF30 push dword ptr fs:[eax]
0061C636 . 64:8920 mov dword ptr fs:[eax], esp
0061C639 . 8B45 F8 mov eax, dword ptr [ebp-8]
0061C63C . E8 E38BDEFF call 00405224
0061C641 . 83F8 03 cmp eax, 3
0061C644 . 0F8E BD010000 jle 0061C807
0061C64A . 8B45 F4 mov eax, dword ptr [ebp-C]
0061C64D . E8 D28BDEFF call 00405224
0061C652 . 83F8 10 cmp eax, 10
0061C655 . 0F85 AC010000 jnz 0061C807
0061C65B . 8D4D E8 lea ecx, dword ptr [ebp-18]
0061C65E . 8B55 F4 mov edx, dword ptr [ebp-C]
0061C661 . 8B45 F8 mov eax, dword ptr [ebp-8]
0061C664 . E8 5B18F2FF call 0053DEC4
0061C669 . 8B55 E8 mov edx, dword ptr [ebp-18]
0061C66C . 8B45 F4 mov eax, dword ptr [ebp-C]
0061C66F . E8 FC8CDEFF call 00405370
0061C674 . 0F85 8D010000 jnz 0061C807
0061C67A . A1 3CB16F00 mov eax, dword ptr [6FB13C]
0061C67F . 8B00 mov eax, dword ptr [eax]
0061C681 . 8B80 44030000 mov eax, dword ptr [eax+344]
0061C687 . BA A8C86100 mov edx, 0061C8A8 ; ASCII "select * from usermsg"
0061C68C . E8 7303F2FF call 0053CA04
0061C691 . 84C0 test al, al
0061C693 . 0F84 6E010000 je 0061C807
0061C699 . A1 3CB16F00 mov eax, dword ptr [6FB13C]
0061C69E . 8B00 mov eax, dword ptr [eax]
0061C6A0 . 8B80 44030000 mov eax, dword ptr [eax+344]
0061C6A6 . E8 ED8CEBFF call 004D5398
0061C6AB . 8D4D E4 lea ecx, dword ptr [ebp-1C]
0061C6AE . 8B15 88B46F00 mov edx, dword ptr [6FB488] ; SuccessP.006FA940
0061C6B4 . 8B12 mov edx, dword ptr [edx]
0061C6B6 . 8B45 F8 mov eax, dword ptr [ebp-8]
0061C6B9 . E8 AADFF1FF call 0053A668
0061C6BE . 8B45 E4 mov eax, dword ptr [ebp-1C]
0061C6C1 . 50 push eax
0061C6C2 . A1 3CB16F00 mov eax, dword ptr [6FB13C]
0061C6C7 . 8B00 mov eax, dword ptr [eax]
0061C6C9 . 8B80 44030000 mov eax, dword ptr [eax+344]
0061C6CF . BA C8C86100 mov edx, 0061C8C8 ; ASCII "field3"
0061C6D4 . E8 FF74EBFF call 004D3BD8
0061C6D9 . 5A pop edx
0061C6DA . 8B08 mov ecx, dword ptr [eax]
0061C6DC . FF91 B0000000 call dword ptr [ecx+B0]
0061C6E2 . 8D4D E0 lea ecx, dword ptr [ebp-20]
0061C6E5 . 8B15 88B46F00 mov edx, dword ptr [6FB488] ; SuccessP.006FA940
0061C6EB . 8B12 mov edx, dword ptr [edx]
0061C6ED . 8B45 F4 mov eax, dword ptr [ebp-C]
0061C6F0 . E8 73DFF1FF call 0053A668
0061C6F5 . 8B45 E0 mov eax, dword ptr [ebp-20]
0061C6F8 . 50 push eax
0061C6F9 . A1 3CB16F00 mov eax, dword ptr [6FB13C]
0061C6FE . 8B00 mov eax, dword ptr [eax]
0061C700 . 8B80 44030000 mov eax, dword ptr [eax+344]
0061C706 . BA D8C86100 mov edx, 0061C8D8 ; ASCII "field4"
0061C70B . E8 C874EBFF call 004D3BD8
0061C710 . 5A pop edx
0061C711 . 8B08 mov ecx, dword ptr [eax]
0061C713 . FF91 B0000000 call dword ptr [ecx+B0]
0061C719 . A1 3CB16F00 mov eax, dword ptr [6FB13C]
0061C71E . 8B00 mov eax, dword ptr [eax]
0061C720 . 8B80 44030000 mov eax, dword ptr [eax+344]
0061C726 . 8B10 mov edx, dword ptr [eax]
0061C728 . FF92 4C020000 call dword ptr [edx+24C]
0061C72E . 8D55 D8 lea edx, dword ptr [ebp-28]
0061C731 . 8B45 FC mov eax, dword ptr [ebp-4]
0061C734 . 8B80 30030000 mov eax, dword ptr [eax+330]
0061C73A . E8 55C2E6FF call 00488994
0061C73F . 8B45 D8 mov eax, dword ptr [ebp-28]
0061C742 . 8D55 DC lea edx, dword ptr [ebp-24]
0061C745 . E8 9AD8DEFF call 00409FE4
0061C74A . 8B55 DC mov edx, dword ptr [ebp-24]
0061C74D . A1 F4B86F00 mov eax, dword ptr [6FB8F4]
0061C752 . E8 6188DEFF call 00404FB8
0061C757 . 8D55 D4 lea edx, dword ptr [ebp-2C]
0061C75A . 8B45 FC mov eax, dword ptr [ebp-4]
0061C75D . 8B80 34030000 mov eax, dword ptr [eax+334]
0061C763 . E8 2CC2E6FF call 00488994
0061C768 . 8B55 D4 mov edx, dword ptr [ebp-2C]
0061C76B . A1 14B76F00 mov eax, dword ptr [6FB714]
0061C770 . E8 4388DEFF call 00404FB8
0061C775 . A1 50B76F00 mov eax, dword ptr [6FB750]
0061C77A . C600 01 mov byte ptr [eax], 1
0061C77D . 6A 30 push 30
0061C77F . A1 40B76F00 mov eax, dword ptr [6FB740]
0061C784 . 8B00 mov eax, dword ptr [eax]
0061C786 . E8 998CDEFF call 00405424
0061C78B . 50 push eax
0061C78C . 68 E0C86100 push 0061C8E0 注册成功!
0061C791 . 8B45 FC mov eax, dword ptr [ebp-4]
0061C794 . E8 9B2BE7FF call 0048F334
0061C799 . 50 push eax ; |hOwner
0061C79A . E8 BDBFDEFF call <jmp.&user32.MessageBoxA> ; \MessageBoxA
0061C79F . 68 F4C86100 push 0061C8F4
0061C7A4 . A1 F4B86F00 mov eax, dword ptr [6FB8F4]
0061C7A9 . FF30 push dword ptr [eax]
0061C7AB . 68 04C96100 push 0061C904
0061C7B0 . A1 40B76F00 mov eax, dword ptr [6FB740]
0061C7B5 . FF30 push dword ptr [eax]
0061C7B7 . 68 10C96100 push 0061C910
0061C7BC . 8D45 D0 lea eax, dword ptr [ebp-30]
0061C7BF . BA 05000000 mov edx, 5
0061C7C4 . E8 1B8BDEFF call 004052E4
0061C7C9 . 8B55 D0 mov edx, dword ptr [ebp-30]
0061C7CC . A1 3CB16F00 mov eax, dword ptr [6FB13C]
0061C7D1 . 8B00 mov eax, dword ptr [eax]
0061C7D3 . E8 ECC1E6FF call 004889C4
0061C7D8 . A1 C4B16F00 mov eax, dword ptr [6FB1C4]
0061C7DD . 8B00 mov eax, dword ptr [eax]
0061C7DF . 8B40 5C mov eax, dword ptr [eax+5C]
0061C7E2 . 33D2 xor edx, edx
0061C7E4 . E8 3B67E2FF call 00442F24
0061C7E9 . A1 3CB16F00 mov eax, dword ptr [6FB13C]
0061C7EE . 8B00 mov eax, dword ptr [eax]
0061C7F0 . E8 B7CF0B00 call 006D97AC
0061C7F5 . 8B45 FC mov eax, dword ptr [ebp-4]
0061C7F8 . E8 3B9DE8FF call 004A6538
0061C7FD . 33C0 xor eax, eax
0061C7FF . 5A pop edx
0061C800 . 59 pop ecx
0061C801 . 59 pop ecx
0061C802 . 64:8910 mov dword ptr fs:[eax], edx
0061C805 . EB 3E jmp short 0061C845
0061C807 > 33C0 xor eax, eax
0061C809 . 5A pop edx
0061C80A . 59 pop ecx
0061C80B . 59 pop ecx
0061C80C . 64:8910 mov dword ptr fs:[eax], edx
0061C80F . EB 0A jmp short 0061C81B
0061C811 .^ E9 1A7DDEFF jmp 00404530
0061C816 . E8 4181DEFF call 0040495C
0061C81B > 6A 30 push 30
0061C81D . A1 40B76F00 mov eax, dword ptr [6FB740]
0061C822 . 8B00 mov eax, dword ptr [eax]
0061C824 . E8 FB8BDEFF call 00405424
0061C829 . 50 push eax
0061C82A . 68 1CC96100 push 0061C91C 注册失败!
0061C82F . 8B45 FC mov eax, dword ptr [ebp-4]
0061C832 . E8 FD2AE7FF call 0048F334
0061C837 . 50 push eax ; |hOwner
0061C838 . E8 1FBFDEFF call <jmp.&user32.MessageBoxA> ; \MessageBoxA
0061C83D . 8B45 FC mov eax, dword ptr [ebp-4]
0061C840 . E8 F39CE8FF call 004A6538
0061C845 > 33C0 xor eax, eax
0061C847 . 5A pop edx
0061C848 . 59 pop ecx
0061C849 . 59 pop ecx
0061C84A . 64:8910 mov dword ptr fs:[eax], edx
0061C84D . 68 96C86100 push 0061C896
0061C852 > 8D45 D0 lea eax, dword ptr [ebp-30]
0061C855 . E8 0A87DEFF call 00404F64
0061C85A . 8D45 D4 lea eax, dword ptr [ebp-2C]
0061C85D . BA 02000000 mov edx, 2
0061C862 . E8 2187DEFF call 00404F88
0061C867 . 8D45 DC lea eax, dword ptr [ebp-24]
0061C86A . BA 04000000 mov edx, 4
0061C86F . E8 1487DEFF call 00404F88
0061C874 . 8D45 EC lea eax, dword ptr [ebp-14]
0061C877 . BA 02000000 mov edx, 2
0061C87C . E8 0787DEFF call 00404F88
0061C881 . 8D45 F4 lea eax, dword ptr [ebp-C]
0061C884 . BA 02000000 mov edx, 2
0061C889 . E8 FA86DEFF call 00404F88
0061C88E . C3 retn
0061C88F .^ E9 507FDEFF jmp 004047E4
0061C894 .^ EB BC jmp short 0061C852
0061C896 . 5F pop edi
0061C897 . 5E pop esi
0061C898 . 5B pop ebx
0061C899 . 8BE5 mov esp, ebp
0061C89B . 5D pop ebp
0061C89C . C3 retn
0061C89D 00 db 00
0061C89E 00 db 00
0061C89F 00 db 00
0061C8A0 . FFFFFFFF dd FFFFFFFF
0061C8A4 . 15000000 dd 00000015
0061C8A8 . 73 65 6C 65 6>ascii "select * from us"
0061C8B8 . 65 72 6D 73 6>ascii "ermsg",0
0061C8BE 00 db 00
0061C8BF 00 db 00
0061C8C0 . FFFFFFFF dd FFFFFFFF
0061C8C4 . 06000000 dd 00000006
0061C8C8 . 66 69 65 6C 6>ascii "field3",0
0061C8CF 00 db 00
0061C8D0 . FFFFFFFF dd FFFFFFFF
0061C8D4 . 06000000 dd 00000006
0061C8D8 . 66 69 65 6C 6>ascii "field4",0
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课