好友
阅读权限 20
听众
最后登录 1970-1-1
破解 NetInfo记录-(有点典型)
-i386 Information Security Team Of China by:kernel2008 qq:kernel2008@qq.com-
【目标程序】NetInfo - Version 6.4
【调试平台】深度优化windows xp sp2
【用到工具】OD,Peid,ImportREC,C32ASM,破解计算器
【破解目的】偶菜菜的,想啊想玩玩,没什么目的的,有目的就是学习^_^
【用到脚本】PeCompact OEP Finder.txt
【文件下载】http://netinfo.tsarfin.com.
【破解缘由】最近发现吾爱破解 论坛热气沸腾,偶菜菜来献丑一下,当然主要是向大大……学习来了^_^!
关于NetInfo的解释,大家看了,我就不翻译了!
What Is NetInfo?
----------------
NetInfo is a collection of 15 different state-of-the-art network tools on a single, easy-to-use interface.
Designed from first-hand experience, NetInfo allows businesses to more effectively combat network downtime
by allowing network administrators, webmasters, and Internet service providers to more accurately isolate
faults, simplify processing of diagnostic data and increase internal network security.
开始进入偶菜菜的,想啊想玩的旅途吧^_^!
使用Peid查壳,显示为:
PECompact 2.x -> Jeremy Collake [Overlay]
注意[Overlay],提示有附加数据,脱壳 后得处理下附加数据
载入目标程序于OD中,入口处部分代码:
00401000 > B8 98F14700 MOV EAX,NetInfo.0047F198
00401005 50 PUSH EAX
00401006 64:FF35 0000000>PUSH DWORD PTR FS:[0]
0040100D 64:8925 0000000>MOV DWORD PTR FS:[0],ESP
这里就不手脱壳了,设置下OD,忽略所有异常后重载下程序就用脚本直接来跑。
很快的就到达了程序的OEP,OEP部分代码如下:
004277C7 6A 74 PUSH 74
004277C9 68 08454300 PUSH NetInfo.00434508
004277CE E8 F5010000 CALL NetInfo.004279C8
004277D3 33DB XOR EBX,EBX
004277D5 895D E0 MOV DWORD PTR SS:[EBP-20],EBX
004277D8 53 PUSH EBX
直接使用OD插件脱壳吧,然后使用ImportREC抓取修复(有两个指针无效,直接剪切掉),再在使用使用Peid查壳,显示
为:
Microsoft Visual C++ 7.0 Method2
运行下脱壳后目标程序,可以跑起来,但是有附加数据,为了程序的完整性我们还是来处理下附加数据吧,使用Peid打开
原目标程序程序,查看下EP段,记录下最后一个区段的这两个数值:
R.偏移=24600
R.大小=9400
使用破解计算器计算 :R.偏移+R.大小=2DA00
载入原目标程序C32ASM跳转到2DA00这处,选中部分后往下拖动到底部按住Shift,拷贝;再载入脱壳修复后目标程序于
C32ASM,找到底部粘贴刚才所拷贝的数据,再来一遍,出现了点错误,接着保存下文件,至此附加数据处理完毕 。使用
Peid查壳,显示为:
Microsoft Visual C++ 7.0 Method2 [Overlay]
运行处理附加数据后的程序,正常跑起来,好,接着我们来破解。载入刚刚处理好的程序,F9让它运行起来,然后注册,
输入用户名即是User Name:i386 Information Security Team Of China和假码即是License Key:123456,提示错误,别
管,暂停OD,按ALT+K显示堆栈。跟进去后选择最后一个,显示调用。往上找到段头,该部分代码及其注释如下:
断下来后,按住F8往下单步跟踪
00421EB0 . 6A FF PUSH -1 //在此下好断点,F9运行,重新注册追码
00421EB2 . 68 899A4200 PUSH 277C7_.00429A89 ; SE 处理程序安装
00421EB7 . 64:A1 0000000>MOV EAX,DWORD PTR FS:[0]
00421EBD . 50 PUSH EAX
00421EBE . 64:8925 00000>MOV DWORD PTR FS:[0],ESP
00421EC5 . 51 PUSH ECX
00421EC6 . 53 PUSH EBX
00421EC7 . 56 PUSH ESI
00421EC8 . 57 PUSH EDI
00421EC9 . 6A 01 PUSH 1
00421ECB . 8BF1 MOV ESI,ECX
00421ECD . E8 4A500000 CALL <JMP.&mfc71.#6236>
00421ED2 . 8D7E 74 LEA EDI,DWORD PTR DS:[ESI+74]
00421ED5 . 8BCF MOV ECX,EDI
00421ED7 . FF15 DCB24200 CALL DWORD PTR DS:[<&mfc71.#6168>] ; mfc71.7C18A0BF
00421EDD . 8D5E 78 LEA EBX,DWORD PTR DS:[ESI+78]
00421EE0 . 8BCB MOV ECX,EBX
00421EE2 . FF15 DCB24200 CALL DWORD PTR DS:[<&mfc71.#6168>] ; mfc71.7C18A0BF
00421EE8 . 6A 07 PUSH 7
00421EEA . 8BCF MOV ECX,EDI
00421EEC . FF15 F0B14200 CALL DWORD PTR DS:[<&mfc71.#874>] ; mfc71.7C158BCD
00421EF2 . 50 PUSH EAX
00421EF3 . 8D4E 7C LEA ECX,DWORD PTR DS:[ESI+7C]
00421EF6 . FF15 F0B14200 CALL DWORD PTR DS:[<&mfc71.#874>] //读取用户名
00421EFC . 50 PUSH EAX
00421EFD . FF15 FCB94200 CALL DWORD PTR DS:[<&tcbaseapi.kg>] //读取机器名称
00421F03 . 83C4 0C ADD ESP,0C //寄存器出现注册码
00421F06 . 50 PUSH EAX
00421F07 . 8BCB MOV ECX,EBX
00421F09 . FF15 08B54200 CALL DWORD PTR DS:[<&mfc71.#1482>]
00421F0F . 85C0 TEST EAX,EAX
00421F11 . 0F85 13010000 JNZ 277C7_.0042202A //关键跳,跳向错误!爆破可此该为JE
00421F17 . 8D4C24 0C LEA ECX,DWORD PTR SS:[ESP+C]
00421F1B . FF15 14B24200 CALL DWORD PTR DS:[<&mfc71.#293>] ; mfc71.7C173199
00421F21 . 8B86 80000000 MOV EAX,DWORD PTR DS:[ESI+80]
00421F27 . C680 48030000>MOV BYTE PTR DS:[EAX+348],0
00421F2E . 8B8E 80000000 MOV ECX,DWORD PTR DS:[ESI+80]
00421F34 . C681 49030000>MOV BYTE PTR DS:[ECX+349],1
00421F3B . 8BCF MOV ECX,EDI
00421F3D . C74424 18 000>MOV DWORD PTR SS:[ESP+18],0
00421F45 . FF15 F0B14200 CALL DWORD PTR DS:[<&mfc71.#874>] ; mfc71.7C158BCD
00421F4B . 8B8E 80000000 MOV ECX,DWORD PTR DS:[ESI+80]
00421F51 . 50 PUSH EAX
00421F52 . 68 0CBF4200 PUSH 277C7_.0042BF0C ; ASCII "User Name"
00421F57 . 68 00BF4200 PUSH 277C7_.0042BF00 ; ASCII "Register"
00421F5C . E8 D1530000 CALL <JMP.&mfc71.#6306>
00421F61 . 8BCB MOV ECX,EBX
00421F63 . FF15 F0B14200 CALL DWORD PTR DS:[<&mfc71.#874>] ; mfc71.7C158BCD
00421F69 . 8B8E 80000000 MOV ECX,DWORD PTR DS:[ESI+80]
00421F6F . 50 PUSH EAX
00421F70 . 68 F4BE4200 PUSH 277C7_.0042BEF4 ; ASCII "License Key"
00421F75 . 68 00BF4200 PUSH 277C7_.0042BF00 ; ASCII "Register"
00421F7A . E8 B3530000 CALL <JMP.&mfc71.#6306>
00421F7F . 8B8E 84000000 MOV ECX,DWORD PTR DS:[ESI+84]
00421F85 . 68 70054300 PUSH 277C7_.00430570 ; ASCII "NetInfo"
00421F8A . 81C1 38100000 ADD ECX,1038
00421F90 . FF15 04B24200 CALL DWORD PTR DS:[<&mfc71.#771>] ; mfc71.7C14FF74
00421F96 . 8B8E 84000000 MOV ECX,DWORD PTR DS:[ESI+84]
00421F9C . 8D5424 0C LEA EDX,DWORD PTR SS:[ESP+C]
00421FA0 . 52 PUSH EDX
00421FA1 . E8 50530000 CALL <JMP.&mfc71.#3761>
00421FA6 . 6A 15 PUSH 15
00421FA8 . 6A 08 PUSH 8
00421FAA . 8D4C24 14 LEA ECX,DWORD PTR SS:[ESP+14]
00421FAE . FF15 F4B14200 CALL DWORD PTR DS:[<&mfc71.#1916>] ; mfc71.7C189568
00421FB4 . 8D4C24 0C LEA ECX,DWORD PTR SS:[ESP+C]
00421FB8 . FF15 F0B14200 CALL DWORD PTR DS:[<&mfc71.#874>] ; mfc71.7C158BCD
00421FBE . 8B8E 84000000 MOV ECX,DWORD PTR DS:[ESI+84]
00421FC4 . 50 PUSH EAX
00421FC5 . E8 38530000 CALL <JMP.&mfc71.#6067>
00421FCA . 8B86 84000000 MOV EAX,DWORD PTR DS:[ESI+84]
00421FD0 . 8B88 440E0000 MOV ECX,DWORD PTR DS:[EAX+E44]
00421FD6 . 8B51 04 MOV EDX,DWORD PTR DS:[ECX+4]
00421FD9 . 6A 00 PUSH 0 ; /Flags =
MF_BYCOMMAND|MF_ENABLED|MF_STRING
00421FDB . 68 23800000 PUSH 8023 ; |ItemId = 8023 (32803.)
00421FE0 . 52 PUSH EDX ; |hMenu
00421FE1 . FF15 34BA4200 CALL DWORD PTR DS:[<&user32.DeleteMenu>] ; \DeleteMenu
00421FE7 . 8B8E 84000000 MOV ECX,DWORD PTR DS:[ESI+84]
00421FED . 6A 00 PUSH 0
00421FEF . 6A 00 PUSH 0
00421FF1 . 6A 00 PUSH 0
00421FF3 . 6A 00 PUSH 0
00421FF5 . 6A 02 PUSH 2
00421FF7 . 68 602B4300 PUSH 277C7_.00432B60 ; ASCII
"res://netinfo.exe/webcenter.htm"
00421FFC . 81C1 480E0000 ADD ECX,0E48
00422002 . E8 DF500000 CALL <JMP.&mfc71.#4127>
00422007 . 8BCE MOV ECX,ESI
00422009 . E8 0C4E0000 CALL <JMP.&mfc71.#4735>
0042200E . 8D4C24 0C LEA ECX,DWORD PTR SS:[ESP+C]
00422012 . FF15 08B24200 CALL DWORD PTR DS:[<&mfc71.#575>] ; mfc71.7C1771B1
00422018 . 5F POP EDI
00422019 . 5E POP ESI
0042201A . 5B POP EBX
0042201B . 8B4C24 04 MOV ECX,DWORD PTR SS:[ESP+4]
0042201F . 64:890D 00000>MOV DWORD PTR FS:[0],ECX
00422026 . 83C4 10 ADD ESP,10
00422029 . C3 RETN
0042202A > 6A 00 PUSH 0
0042202C . 6A 00 PUSH 0
0042202E . 68 382B4300 PUSH 277C7_.00432B38 //错误提示,注册不成功处!
00422033 . E8 DC4D0000 CALL <JMP.&mfc71.#1123>
00422038 . 8B4C24 10 MOV ECX,DWORD PTR SS:[ESP+10]
大家可以看以上代码分析,注册机在此就不做了!(太懒了,哈哈!)
用户名:i386 Information Security Team Of China
注册码:088F-CD4903F7-3DE1
我们注册后就没有Buy的选项了,看下关于呀,^_^!OK!
吾来凑热闹来了,该文发表于吾爱破解论坛http://www.52pojie.cn ,转载请注明来源。哈哈,只为证明自己的存在!
吾爱破解论坛,大大的,……,大大的好!偶支持奥运,反对ZD!再见!
2008.04.21
破解NetInfo记录屏幕录像下载:
http://www.namipan.com/d/c6f458d ... bf257c38d01104d9800