附件上传不了,下载地址http://cnc.skycn.com/search.php
程序加的为UPX壳,用脱壳机去壳后用OD载入,根据5月20日发的贴子中sizhaoming朋友的提示,做了以下的爆破:
0061C955 . 55 push ebp
0061C956 . 68 39CB6100 push 0061CB39
0061C95B . 64:FF30 push dword ptr fs:[eax]
0061C95E . 64:8920 mov dword ptr fs:[eax], esp
0061C961 . 8B45 F8 mov eax, dword ptr [ebp-8]
0061C964 . E8 BB88DEFF call 00405224
0061C969 . 83F8 03 cmp eax, 3
0061C96C . 0F8E BD010000 jle 0061CB2F
0061C972 . 8B45 F4 mov eax, dword ptr [ebp-C]
0061C975 . E8 AA88DEFF call 00405224
0061C97A . 83F8 10 cmp eax, 10
0061C97D . 0F84 AC010000 je 0061CB2F ; jnz汇编成为je的
0061C983 . 8D4D E8 lea ecx, dword ptr [ebp-18]
0061C986 . 8B55 F4 mov edx, dword ptr [ebp-C]
0061C989 . 8B45 F8 mov eax, dword ptr [ebp-8]
0061C98C . E8 A717F2FF call 0053E138
0061C991 . 8B55 E8 mov edx, dword ptr [ebp-18]
0061C994 . 8B45 F4 mov eax, dword ptr [ebp-C]
0061C997 . E8 D489DEFF call 00405370
0061C99C . 0F84 8D010000 je 0061CB2F ; jnz汇编成为je的0061C9A2 . A1 44E16F00 mov eax, dword ptr [6FE144]
0061C9A7 . 8B00 mov eax, dword ptr [eax]
0061C9A9 . 8B80 44030000 mov eax, dword ptr [eax+344]
0061C9AF . BA D0CB6100 mov edx, 0061CBD0 ; ASCII "select * from usermsg"
0061C9B4 . E8 BF02F2FF call 0053CC78
0061C9B9 . 84C0 test al, al
0061C9BB . 0F84 6E010000 je 0061CB2F
0061C9C1 . A1 44E16F00 mov eax, dword ptr [6FE144]
0061C9C6 . 8B00 mov eax, dword ptr [eax]
0061C9C8 . 8B80 44030000 mov eax, dword ptr [eax+344]
0061C9CE . E8 C589EBFF call 004D5398
0061C9D3 . 8D4D E4 lea ecx, dword ptr [ebp-1C]
0061C9D6 . 8B15 90E46F00 mov edx, dword ptr [6FE490] ; SuccessP.006FD940
0061C9DC . 8B12 mov edx, dword ptr [edx]
0061C9DE . 8B45 F8 mov eax, dword ptr [ebp-8]
0061C9E1 . E8 F6DEF1FF call 0053A8DC
0061C9E6 . 8B45 E4 mov eax, dword ptr [ebp-1C]
0061C9E9 . 50 push eax
0061C9EA . A1 44E16F00 mov eax, dword ptr [6FE144]
0061C9EF . 8B00 mov eax, dword ptr [eax]
0061C9F1 . 8B80 44030000 mov eax, dword ptr [eax+344]
0061C9F7 . BA F0CB6100 mov edx, 0061CBF0 ; ASCII "field3"
0061C9FC . E8 D771EBFF call 004D3BD8
0061CA01 . 5A pop edx
0061CA02 . 8B08 mov ecx, dword ptr [eax]
0061CA04 . FF91 B0000000 call dword ptr [ecx+B0]
0061CA0A . 8D4D E0 lea ecx, dword ptr [ebp-20]
0061CA0D . 8B15 90E46F00 mov edx, dword ptr [6FE490] ; SuccessP.006FD940
0061CA13 . 8B12 mov edx, dword ptr [edx]
0061CA15 . 8B45 F4 mov eax, dword ptr [ebp-C]
0061CA18 . E8 BFDEF1FF call 0053A8DC
0061CA1D . 8B45 E0 mov eax, dword ptr [ebp-20]
0061CA20 . 50 push eax
0061CA21 . A1 44E16F00 mov eax, dword ptr [6FE144]
0061CA26 . 8B00 mov eax, dword ptr [eax]
0061CA28 . 8B80 44030000 mov eax, dword ptr [eax+344]
0061CA2E . BA 00CC6100 mov edx, 0061CC00 ; ASCII "field4"
0061CA33 . E8 A071EBFF call 004D3BD8
0061CA38 . 5A pop edx
0061CA39 . 8B08 mov ecx, dword ptr [eax]
0061CA3B . FF91 B0000000 call dword ptr [ecx+B0]
0061CA41 . A1 44E16F00 mov eax, dword ptr [6FE144]
0061CA46 . 8B00 mov eax, dword ptr [eax]
0061CA48 . 8B80 44030000 mov eax, dword ptr [eax+344]
0061CA4E . 8B10 mov edx, dword ptr [eax]
0061CA50 . FF92 4C020000 call dword ptr [edx+24C]
0061CA56 . 8D55 D8 lea edx, dword ptr [ebp-28]
0061CA59 . 8B45 FC mov eax, dword ptr [ebp-4]
0061CA5C . 8B80 20030000 mov eax, dword ptr [eax+320]
0061CA62 . E8 2DBFE6FF call 00488994
0061CA67 . 8B45 D8 mov eax, dword ptr [ebp-28]
0061CA6A . 8D55 DC lea edx, dword ptr [ebp-24]
0061CA6D . E8 72D5DEFF call 00409FE4
0061CA72 . 8B55 DC mov edx, dword ptr [ebp-24]
0061CA75 . A1 FCE86F00 mov eax, dword ptr [6FE8FC]
0061CA7A . E8 3985DEFF call 00404FB8
0061CA7F . 8D55 D4 lea edx, dword ptr [ebp-2C]
0061CA82 . 8B45 FC mov eax, dword ptr [ebp-4]
0061CA85 . 8B80 24030000 mov eax, dword ptr [eax+324]
0061CA8B . E8 04BFE6FF call 00488994
0061CA90 . 8B55 D4 mov edx, dword ptr [ebp-2C]
0061CA93 . A1 1CE76F00 mov eax, dword ptr [6FE71C]
0061CA98 . E8 1B85DEFF call 00404FB8
0061CA9D . A1 58E76F00 mov eax, dword ptr [6FE758]
0061CAA2 . C600 01 mov byte ptr [eax], 1
0061CAA5 . 6A 30 push 30
0061CAA7 . A1 48E76F00 mov eax, dword ptr [6FE748]
0061CAAC . 8B00 mov eax, dword ptr [eax]
0061CAAE . E8 7189DEFF call 00405424
0061CAB3 . 50 push eax
0061CAB4 . 68 08CC6100 push 0061CC08 ; 注册成功
0061CAB9 . 8B45 FC mov eax, dword ptr [ebp-4]
0061CABC . E8 7328E7FF call 0048F334
0061CAC1 . 50 push eax ; |hOwner
0061CAC2 . E8 95BCDEFF call <jmp.&user32.MessageBoxA> ; \MessageBoxA
0061CAC7 . 68 1CCC6100 push 0061CC1C
0061CACC . A1 FCE86F00 mov eax, dword ptr [6FE8FC]
0061CAD1 . FF30 push dword ptr [eax]
0061CAD3 . 68 2CCC6100 push 0061CC2C
0061CAD8 . A1 48E76F00 mov eax, dword ptr [6FE748]
0061CADD . FF30 push dword ptr [eax]
0061CADF . 68 38CC6100 push 0061CC38
0061CAE4 . 8D45 D0 lea eax, dword ptr [ebp-30]
0061CAE7 . BA 05000000 mov edx, 5
0061CAEC . E8 F387DEFF call 004052E4
0061CAF1 . 8B55 D0 mov edx, dword ptr [ebp-30]
0061CAF4 . A1 44E16F00 mov eax, dword ptr [6FE144]
0061CAF9 . 8B00 mov eax, dword ptr [eax]
0061CAFB . E8 C4BEE6FF call 004889C4
0061CB00 . A1 CCE16F00 mov eax, dword ptr [6FE1CC]
0061CB05 . 8B00 mov eax, dword ptr [eax]
0061CB07 . 8B40 5C mov eax, dword ptr [eax+5C]
0061CB0A . 33D2 xor edx, edx
0061CB0C . E8 1364E2FF call 00442F24
0061CB11 . A1 44E16F00 mov eax, dword ptr [6FE144]
0061CB16 . 8B00 mov eax, dword ptr [eax]
0061CB18 . E8 ABEE0B00 call 006DB9C8
0061CB1D . 8B45 FC mov eax, dword ptr [ebp-4]
0061CB20 . E8 139AE8FF call 004A6538
0061CB25 . 33C0 xor eax, eax
0061CB27 . 5A pop edx
0061CB28 . 59 pop ecx
0061CB29 . 59 pop ecx
0061CB2A . 64:8910 mov dword ptr fs:[eax], edx
0061CB2D . EB 3E jmp short 0061CB6D
0061CB2F > 33C0 xor eax, eax
0061CB31 . 5A pop edx
0061CB32 . 59 pop ecx
0061CB33 . 59 pop ecx
0061CB34 . 64:8910 mov dword ptr fs:[eax], edx
0061CB37 . EB 0A jmp short 0061CB43
0061CB39 .^ E9 F279DEFF jmp 00404530
0061CB3E . E8 197EDEFF call 0040495C
0061CB43 > 6A 30 push 30
0061CB45 . A1 48E76F00 mov eax, dword ptr [6FE748]
0061CB4A . 8B00 mov eax, dword ptr [eax]
0061CB4C . E8 D388DEFF call 00405424
0061CB51 . 50 push eax
0061CB52 . 68 44CC6100 push 0061CC44 ; 注册失败
0061CB57 . 8B45 FC mov eax, dword ptr [ebp-4]
0061CB5A . E8 D527E7FF call 0048F334
0061CB5F . 50 push eax ; |hOwner
0061CB60 . E8 F7BBDEFF call <jmp.&user32.MessageBoxA> ; \MessageBoxA
0061CB65 . 8B45 FC mov eax, dword ptr [ebp-4]
0061CB68 . E8 CB99E8FF call 004A6538
0061CB6D > 33C0 xor eax, eax
上边两处爆破后,随便填入用户名要大于3位,注册码只要不是16位都会提示注册成功,表面上是注册成功了,但只要是超过试用版本30天的有效期后,同样是会出现注册的页面.于是自己又研究几天,由于自己水平有限,只能把30天的时间限制去掉.怎样也找不到其它的爆破方法,更不要说是跟注册算法,还是发到论坛中大家帮忙分析.
只为学习,没有商业目的.谢谢大家.
[注意]传递专业知识、拓宽行业人脉——看雪讲师团队等你加入!