到今天也算学了几天的破解知识拉,所以拉了个小软件学学爆破,但爆破是成功了~却不完美,因为没次启动软件的时候都要你点下注册然后提示注册成功才可以使用。。退后在点又是如此
代码入下~~大大们帮我看看哪错了,或是哪还没爆掉~3Q3Q
00488DCD . /EB 0A jmp short 00488DD9
00488DCF .^|E9 90B0F7FF jmp 00403E64
00488DD4 . |E8 F3B3F7FF call 004041CC
00488DD9 > \8B45 FC mov eax, dword ptr [ebp-4]
00488DDC . 8B80 20040000 mov eax, dword ptr [eax+420]
00488DE2 . 35 280BB61E xor eax, 1EB60B28
00488DE7 3B45 F8 cmp eax, dword ptr [ebp-8] ; 关键比较,真码在EAX
00488DEA 0F85 A0000000 jnz 00488E90 ; 关键跳,不等则跳,跳则OVER~~
00488DF0 . 6A 40 push 40
00488DF2 . 68 D48E4800 push 00488ED4
00488DF7 . 68 E08E4800 push 00488EE0
00488DFC . 8B45 FC mov eax, dword ptr [ebp-4]
00488DFF . E8 1CD2FBFF call 00446020
00488E04 . 50 push eax ; |hOwner
00488E05 . E8 3EE7F7FF call <jmp.&user32.MessageBoxA> ; \MessageBoxA
00488E0A . B2 01 mov dl, 1
00488E0C . A1 E8354600 mov eax, dword ptr [4635E8]
00488E11 . E8 D2A8FDFF call 004636E8
00488E16 . 8BD8 mov ebx, eax
00488E18 . BA 02000080 mov edx, 80000002
00488E1D . 8BC3 mov eax, ebx
00488E1F . E8 64A9FDFF call 00463788
00488E24 . B1 01 mov cl, 1
00488E26 . BA 088F4800 mov edx, 00488F08 ; ASCII "\Software\eNation\ePaper"
00488E2B . 8BC3 mov eax, ebx
00488E2D . E8 BAA9FDFF call 004637EC
00488E32 . 8D55 F0 lea edx, dword ptr [ebp-10]
00488E35 . 8B45 FC mov eax, dword ptr [ebp-4]
00488E38 . 8B80 BC030000 mov eax, dword ptr [eax+3BC]
00488E3E . E8 256BFBFF call 0043F968
00488E43 . 8B4D F0 mov ecx, dword ptr [ebp-10]
00488E46 . BA 2C8F4800 mov edx, 00488F2C ; ASCII "RegCode"
00488E4B . 8BC3 mov eax, ebx
00488E4D . E8 36ABFDFF call 00463988
00488E52 . 8BC3 mov eax, ebx
00488E54 . E8 FFA8FDFF call 00463758
00488E59 . 8BC3 mov eax, ebx
00488E5B . E8 24ABF7FF call 00403984
00488E60 . 8B45 FC mov eax, dword ptr [ebp-4]
00488E63 . 8B80 84030000 mov eax, dword ptr [eax+384]
00488E69 . E8 16ABF7FF call 00403984
00488E6E . 8B45 FC mov eax, dword ptr [ebp-4]
00488E71 . 05 24040000 add eax, 424
00488E76 . E8 75B8F7FF call 004046F0
00488E7B . 8B45 FC mov eax, dword ptr [ebp-4]
00488E7E . 8B80 00030000 mov eax, dword ptr [eax+300]
00488E84 . BA 01000000 mov edx, 1
00488E89 . E8 5E84FEFF call 004712EC
00488E8E . EB 1A jmp short 00488EAA
00488E90 > 6A 10 push 10
00488E92 . 68 348F4800 push 00488F34
00488E97 . 68 408F4800 push 00488F40
00488E9C . 8B45 FC mov eax, dword ptr [ebp-4]
00488E9F . E8 7CD1FBFF call 00446020
00488EA4 . 50 push eax ; |hOwner
00488EA5 . E8 9EE6F7FF call <jmp.&user32.MessageBoxA> ; \MessageBoxA
00488EAA > 33C0 xor eax, eax
00488EAC . 5A pop edx
00488EAD . 59 pop ecx
00488EAE . 59 pop ecx
00488EAF . 64:8910 mov dword ptr fs:[eax], edx
00488EB2 . 68 CC8E4800 push 00488ECC
[课程]Android-CTF解题方法汇总!