我的第一个crackme成功
用OD载入crackme,设置万能断点,然后按F9运行
弹出注册窗口
随便输入名字和注册码,一路按F8向下走
直到遇到注册错误提示框,
00401058 . /75 74 JNZ SHORT ncrackme.004010CE
0040105A . |8B4424 0C MOV EAX,DWORD PTR SS:[ESP+C]
0040105E . |66:3D EA03 CMP AX,3EA
00401062 . |75 42 JNZ SHORT ncrackme.004010A6
00401064 . |E8 C7010000 CALL ncrackme.00401230
00401069 . |85C0 TEST EAX,EAX
0040106B . |6A 00 PUSH 0 ; /Style = MB_OK|MB_APPLMODAL
0040106D . |68 80504000 PUSH ncrackme.00405080 ; |Title = "ncrackme"
00401072 |75 1B JNZ SHORT ncrackme.0040108F
00401074 . |A1 B8564000 MOV EAX,DWORD PTR DS:[4056B8] ; |
00401079 . |68 64504000 PUSH ncrackme.00405064 ; |Text = "Registration successful."
0040107E . |50 PUSH EAX ; |hOwner => 00040356 ('Newbie smallsize crackme - v1',class='myWindowClass')
0040107F . |FF15 C0404000 CALL DWORD PTR DS:[<&USER32.MessageBoxA>>; \MessageBoxA
00401085 . |E8 A6020000 CALL ncrackme.00401330
0040108A . |33C0 XOR EAX,EAX
0040108C . |C2 1000 RETN 10
0040108F > |8B0D B8564000 MOV ECX,DWORD PTR DS:[4056B8] ; |
00401095 . |68 50504000 PUSH ncrackme.00405050 ; |Text = "Registration fail."
0040109A . |51 PUSH ECX ; |hOwner => 00040356 ('Newbie smallsize crackme - v1',class='myWindowClass')
0040109B . |FF15 C0404000 CALL DWORD PTR DS:[<&USER32.MessageBoxA>>; \MessageBoxA
然后往回走找到关键跳:
00401072 |75 1B JNZ SHORT ncrackme.0040108F
修改关键跳JNZ为JZ爆破破解,右键选择修改和保存,到此破解成功
此次crackme选用riijj 的crackme 1:http://bbs.pediy.com/upload/files/1084801702.zip
不知是不是撞彩成功的,没感什么喜悦感
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课