私人文件保密专家白金版带猛壳破解
i386 Information Security Team Of China by:kernel2008qq:kernel2008@qq.com【破文发表】吾爱破解论坛:www.52pojie.cn
【目标程序】私人文件保密专家白金版
【调试平台】深度优化windows xp sp2
【用到工具】OD,Peid
【脱壳缘由】吾爱破解论坛太火了,偶菜菜却太…^_^!论坛里有个兄弟在原创那发了私人文件保密专家白金版的用户和注册码,吾授人于鱼不如授人于渔,把破解记录分享出来跟大家一起学习
【破解目的】偶菜菜,就是想啊想玩玩,如果有目的,那就是来学习了^_^
使用Peid查壳,显示为:
ASProtect 2.0x Registered -> Alexey Solodovnikov
使用插件扫描,显示为:
Version: ASProtect 1.32 build 10.20 Beta
ASProtect序列的,大家可能一看到就怯场了,哈哈,我开始也是试着脱壳的,但没想到他居然能带壳调试,好,那就磨刀霍霍向它吧,载入目标程序于OD中,Shift+F9运行目标程序,在此过程OD可能会有多次异常提示,那就照着OD的提示执行吧。注册程序,输入假码跟用户名即是如下———>
用户名:i386 Information Security Team Of China
注册码:123456
点击注册后出现错误提示,别管太多,暂停OD先,Alt+k显示堆栈,跟进,找到最后一个堆栈,然后显示堆栈,跟进去往上查找,下面我给出这部分代码如下:
004F8BB951 PUSH ECX//找到此并此下断点,F9运行重新注册追码,看下面分析
004F8BBA51 PUSH ECX
004F8BBB51 PUSH ECX
004F8BBC51 PUSH ECX
004F8BBD53 PUSH EBX
004F8BBE56 PUSH ESI
004F8BBF8BD8 MOV EBX,EAX
004F8BC133C0 XOR EAX,EAX
004F8BC355 PUSH EBP
004F8BC468 CB8C4F00 PUSH fcpexper.004F8CCB
004F8BC964:FF30 PUSH DWORD PTR FS:
004F8BCC64:8920 MOV DWORD PTR FS:,ESP
004F8BCF8D55 F8 LEA EDX,DWORD PTR SS:
004F8BD28B83 1C030000MOV EAX,DWORD PTR DS:
004F8BD8E8 13ABF4FF CALL fcpexper.004436F0
004F8BDD8B45 F8 MOV EAX,DWORD PTR SS:
004F8BE050 PUSH EAX
004F8BE18D55 F4 LEA EDX,DWORD PTR SS:
004F8BE48B83 B4030000MOV EAX,DWORD PTR DS:
004F8BEAE8 01ABF4FF CALL fcpexper.004436F0 ; 读取假码
004F8BEF8B45 F4 MOV EAX,DWORD PTR SS:
004F8BF250 PUSH EAX
004F8BF38D55 F0 LEA EDX,DWORD PTR SS:
004F8BF68B83 28030000MOV EAX,DWORD PTR DS:
004F8BFCE8 EFAAF4FF CALL fcpexper.004436F0
004F8C018B55 F0 MOV EDX,DWORD PTR SS:
004F8C048B83 B8030000MOV EAX,DWORD PTR DS:
004F8C0A59 POP ECX
004F8C0BE8 A402FFFF CALL fcpexper.004E8EB4 ; 读取用户名,F7跟进去,代码在下面
004F8C1084C0 TEST AL,AL
004F8C1275 2C JNZ SHORT fcpexper.004F8C40 ; 关键跳转,爆破的话就得让他实现!
004F8C148D45 FC LEA EAX,DWORD PTR SS:
004F8C17BA E08C4F00 MOV EDX,fcpexper.004F8CE0
004F8C1CE8 7FBCF0FF CALL fcpexper.004048A0
004F8C216A 40 PUSH 40
004F8C238B45 FC MOV EAX,DWORD PTR SS:
004F8C26E8 8DC0F0FF CALL fcpexper.00404CB8
004F8C2B8BD0 MOV EDX,EAX
004F8C2DB9 188D4F00 MOV ECX,fcpexper.004F8D18
004F8C32A1 9CC55000 MOV EAX,DWORD PTR DS:
004F8C378B00 MOV EAX,DWORD PTR DS:
004F8C39E8 96BAF6FF CALL fcpexper.004646D4 ; 注册码不正确
004F8C3EEB 68 JMP SHORT fcpexper.004F8CA8
004F8C4068 2C8D4F00 PUSH fcpexper.004F8D2C
004F8C458BB3 B8030000MOV ESI,DWORD PTR DS:
004F8C4BFF76 48 PUSH DWORD PTR DS:
004F8C4E68 708D4F00 PUSH fcpexper.004F8D70
004F8C5368 7C8D4F00 PUSH fcpexper.004F8D7C
004F8C58FF76 54 PUSH DWORD PTR DS:
004F8C5B68 708D4F00 PUSH fcpexper.004F8D70
004F8C6068 908D4F00 PUSH fcpexper.004F8D90
004F8C65FF76 5C PUSH DWORD PTR DS:
004F8C6868 708D4F00 PUSH fcpexper.004F8D70
004F8C6D68 A48D4F00 PUSH fcpexper.004F8DA4
004F8C728D45 FC LEA EAX,DWORD PTR SS:
004F8C75BA 0A000000 MOV EDX,0A
004F8C7AE8 01BFF0FF CALL fcpexper.00404B80
004F8C7F6A 40 PUSH 40
004F8C818B45 FC MOV EAX,DWORD PTR SS:
004F8C84E8 2FC0F0FF CALL fcpexper.00404CB8
004F8C898BD0 MOV EDX,EAX
004F8C8BB9 188D4F00 MOV ECX,fcpexper.004F8D18
004F8C90A1 9CC55000 MOV EAX,DWORD PTR DS:
004F8C958B00 MOV EAX,DWORD PTR DS:
004F8C97E8 38BAF6FF CALL fcpexper.004646D4
004F8C9CA1 9CC55000 MOV EAX,DWORD PTR DS:
004F8CA18B00 MOV EAX,DWORD PTR DS:
004F8CA3E8 88B9F6FF CALL fcpexper.00464630
004F8CA833C0 XOR EAX,EAX
004F8CAA5A POP EDX
004F8CAB59 POP ECX
004F8CAC59 POP ECX
004F8CAD64:8910 MOV DWORD PTR FS:,EDX
004F8CB068 D28C4F00 PUSH fcpexper.004F8CD2
004F8CB58D45 F0 LEA EAX,DWORD PTR SS:
004F8CB8BA 03000000 MOV EDX,3
004F8CBDE8 6ABBF0FF CALL fcpexper.0040482C
004F8CC28D45 FC LEA EAX,DWORD PTR SS:
004F8CC5E8 3EBBF0FF CALL fcpexper.00404808
004F8CCAC3 RETN
F7跟进后代码如下:
004E8EB455 PUSH EBP
004E8EB58BEC MOV EBP,ESP
004E8EB783C4 F0 ADD ESP,-10
004E8EBA53 PUSH EBX
004E8EBB33DB XOR EBX,EBX
004E8EBD895D F0 MOV DWORD PTR SS:,EBX
004E8EC0895D F4 MOV DWORD PTR SS:,EBX
004E8EC3894D F8 MOV DWORD PTR SS:,ECX
004E8EC68955 FC MOV DWORD PTR SS:,EDX
004E8EC98BD8 MOV EBX,EAX
004E8ECB8B45 FC MOV EAX,DWORD PTR SS:
004E8ECEE8 D5BDF1FF CALL fcpexper.00404CA8
004E8ED38B45 F8 MOV EAX,DWORD PTR SS:
004E8ED6E8 CDBDF1FF CALL fcpexper.00404CA8
004E8EDB8B45 08 MOV EAX,DWORD PTR SS:
004E8EDEE8 C5BDF1FF CALL fcpexper.00404CA8
004E8EE333C0 XOR EAX,EAX
004E8EE555 PUSH EBP
004E8EE668 9E8F4E00 PUSH fcpexper.004E8F9E
004E8EEB64:FF30 PUSH DWORD PTR FS:
004E8EEE64:8920 MOV DWORD PTR FS:,ESP
004E8EF18B45 FC MOV EAX,DWORD PTR SS:
004E8EF4E8 C7BBF1FF CALL fcpexper.00404AC0
004E8EF93B43 4C CMP EAX,DWORD PTR DS:
004E8EFC7F 19 JG SHORT fcpexper.004E8F17
004E8EFE8B45 FC MOV EAX,DWORD PTR SS:
004E8F01E8 BABBF1FF CALL fcpexper.00404AC0
004E8F063B43 50 CMP EAX,DWORD PTR DS:
004E8F097C 0C JL SHORT fcpexper.004E8F17
004E8F0B8B45 08 MOV EAX,DWORD PTR SS:
004E8F0EE8 ADBBF1FF CALL fcpexper.00404AC0
004E8F1385C0 TEST EAX,EAX
004E8F1575 04 JNZ SHORT fcpexper.004E8F1B
004E8F1733DB XOR EBX,EBX
004E8F19EB 60 JMP SHORT fcpexper.004E8F7B
004E8F1B8D55 F4 LEA EDX,DWORD PTR SS:
004E8F1E8B45 08 MOV EAX,DWORD PTR SS:
004E8F21E8 BEFEF1FF CALL fcpexper.00408DE4
004E8F268B55 F4 MOV EDX,DWORD PTR SS:
004E8F298D45 08 LEA EAX,DWORD PTR SS:
004E8F2CE8 6FB9F1FF CALL fcpexper.004048A0
004E8F318D4D F0 LEA ECX,DWORD PTR SS:
004E8F348B55 FC MOV EDX,DWORD PTR SS:
004E8F378BC3 MOV EAX,EBX
004E8F39E8 BAFBFFFF CALL fcpexper.004E8AF8
004E8F3E8B45 F0 MOV EAX,DWORD PTR SS:
004E8F418B55 08 MOV EDX,DWORD PTR SS: ; 寄存器出现注册码
004E8F44E8 13FFF1FF CALL fcpexper.00408E5C ; 假码真码比较
004E8F4985C0 TEST EAX,EAX
004E8F4B74 04 JE SHORT fcpexper.004E8F51
004E8F4D33DB XOR EBX,EBX
004E8F4FEB 2A JMP SHORT fcpexper.004E8F7B
004E8F518D43 48 LEA EAX,DWORD PTR DS:
004E8F548B55 FC MOV EDX,DWORD PTR SS:
004E8F57E8 00B9F1FF CALL fcpexper.0040485C
004E8F5C8D43 54 LEA EAX,DWORD PTR DS:
004E8F5F8B55 F8 MOV EDX,DWORD PTR SS:
004E8F62E8 F5B8F1FF CALL fcpexper.0040485C
004E8F678D43 5C LEA EAX,DWORD PTR DS:
004E8F6A8B55 08 MOV EDX,DWORD PTR SS:
004E8F6DE8 EAB8F1FF CALL fcpexper.0040485C
004E8F728BC3 MOV EAX,EBX
004E8F74E8 DF010000 CALL fcpexper.004E9158
004E8F79B3 01 MOV BL,1
004E8F7B33C0 XOR EAX,EAX
004E8F7D5A POP EDX
004E8F7E59 POP ECX
004E8F7F59 POP ECX
004E8F8064:8910 MOV DWORD PTR FS:,EDX
004E8F8368 A58F4E00 PUSH fcpexper.004E8FA5
004E8F888D45 F0 LEA EAX,DWORD PTR SS:
004E8F8BBA 04000000 MOV EDX,4
004E8F90E8 97B8F1FF CALL fcpexper.0040482C
004E8F958D45 08 LEA EAX,DWORD PTR SS:
004E8F98E8 6BB8F1FF CALL fcpexper.00404808
004E8F9DC3 RETN
好追码结果如下:
用户名:i386 Information Security Team Of China
注册码:065692701E
哈哈,不知偶菜菜想玩玩啊这破文是否比发原创区的那个用户和注册码更有含金量,嗯,不好意思哦,偶不是对那位兄弟有意见哈,请见谅,做错了打偶PP^_^!嗯,还是那句话,吾爱破解,那群大大,大大的好。偶菜菜飞呀飞,就来这里跟大大的学习了,哈哈,大家也一起来玩吧!嗯,本想做过屏幕录像照顾下新手朋友的,实在是有点晚了,破文就够了吧,偶明早还得早起奋斗哦。再见呀!
2008.04.21 不错的带壳调试文章~ http://rs.phpwind.net/E___5454ZHYXPWFG.gif 留个纪念,大大坐我沙发了! http://rs.phpwind.net/E___5435ZHALPWFG.gif 这也加威望2,我不服.我破的时候都不给我加,看样子以后不破解了,随便写点文字比破解好呀! 我怎么也找不到它的注册信息保存在哪的,,....... 谢谢了哦
学习学习 好东西,哈哈 引用第3楼飞叶于2008-04-22 19:40发表的 :
这也加威望2,我不服.我破的时候都不给我加,看样子以后不破解了,随便写点文字比破解好呀!
我服,向楼主学习
嘿嘿!来学习!! 引用第3楼飞叶于2008-04-22 19:40发表的 :
这也加威望2,我不服.我破的时候都不给我加,看样子以后不破解了,随便写点文字比破解好呀!
呵呵,这里只是为学习提供了个平台,我不争什么,大家一起来学习,希望你也多写点破文来呀!
页:
[1]
2