好友
阅读权限 20
听众
最后登录 1970-1-1
i386 Information Security Team Of China by:kernel2008 qq:kernel2008@qq.com
【破文发表】吾爱破解 论坛:www.52pojie.cn
【目标程序】私人文件保密专家白金版
【调试平台】深度优化windows xp sp2
【用到工具】OD,Peid
【脱壳 缘由】吾爱破解 论坛太火了,偶菜菜却太…^_^!论坛里有个兄弟在原创那发了私人文件保密专家白金版的用户和注册码,吾授人于鱼不如授人于渔,把破解记录分享出来跟大家一起学习
【破解目的】偶菜菜,就是想啊想玩玩,如果有目的,那就是来学习了^_^
使用Peid查壳,显示为:
ASProtect 2.0x Registered -> Alexey Solodovnikov
使用插件扫描,显示为:
Version: ASProtect 1.32 build 10.20 Beta
ASProtect序列的,大家可能一看到就怯场了,哈哈,我开始也是试着脱壳的,但没想到他居然能带壳调试,好,那就磨刀霍霍向它吧,载入目标程序于OD中,Shift+F9运行目标程序,在此过程OD可能会有多次异常提示,那就照着OD的提示执行吧。注册程序,输入假码跟用户名即是如下———>
用户名:i386 Information Security Team Of China
注册码:123456
点击注册后出现错误提示,别管太多,暂停OD先,Alt+k显示堆栈,跟进,找到最后一个堆栈,然后显示堆栈,跟进去往上查找,下面我给出这部分代码如下:
004F8BB9 51 PUSH ECX //找到此并此下断点,F9运行重新注册追码,看下面分析
004F8BBA 51 PUSH ECX
004F8BBB 51 PUSH ECX
004F8BBC 51 PUSH ECX
004F8BBD 53 PUSH EBX
004F8BBE 56 PUSH ESI
004F8BBF 8BD8 MOV EBX,EAX
004F8BC1 33C0 XOR EAX,EAX
004F8BC3 55 PUSH EBP
004F8BC4 68 CB8C4F00 PUSH fcpexper.004F8CCB
004F8BC9 64:FF30 PUSH DWORD PTR FS:[EAX]
004F8BCC 64:8920 MOV DWORD PTR FS:[EAX],ESP
004F8BCF 8D55 F8 LEA EDX,DWORD PTR SS:[EBP-8]
004F8BD2 8B83 1C030000 MOV EAX,DWORD PTR DS:[EBX+31C]
004F8BD8 E8 13ABF4FF CALL fcpexper.004436F0
004F8BDD 8B45 F8 MOV EAX,DWORD PTR SS:[EBP-8]
004F8BE0 50 PUSH EAX
004F8BE1 8D55 F4 LEA EDX,DWORD PTR SS:[EBP-C]
004F8BE4 8B83 B4030000 MOV EAX,DWORD PTR DS:[EBX+3B4]
004F8BEA E8 01ABF4FF CALL fcpexper.004436F0 ; 读取假码
004F8BEF 8B45 F4 MOV EAX,DWORD PTR SS:[EBP-C]
004F8BF2 50 PUSH EAX
004F8BF3 8D55 F0 LEA EDX,DWORD PTR SS:[EBP-10]
004F8BF6 8B83 28030000 MOV EAX,DWORD PTR DS:[EBX+328]
004F8BFC E8 EFAAF4FF CALL fcpexper.004436F0
004F8C01 8B55 F0 MOV EDX,DWORD PTR SS:[EBP-10]
004F8C04 8B83 B8030000 MOV EAX,DWORD PTR DS:[EBX+3B8]
004F8C0A 59 POP ECX
004F8C0B E8 A402FFFF CALL fcpexper.004E8EB4 ; 读取用户名,F7跟进去,代码在下面
004F8C10 84C0 TEST AL,AL
004F8C12 75 2C JNZ SHORT fcpexper.004F8C40 ; 关键跳转,爆破的话就得让他实现!
004F8C14 8D45 FC LEA EAX,DWORD PTR SS:[EBP-4]
004F8C17 BA E08C4F00 MOV EDX,fcpexper.004F8CE0
004F8C1C E8 7FBCF0FF CALL fcpexper.004048A0
004F8C21 6A 40 PUSH 40
004F8C23 8B45 FC MOV EAX,DWORD PTR SS:[EBP-4]
004F8C26 E8 8DC0F0FF CALL fcpexper.00404CB8
004F8C2B 8BD0 MOV EDX,EAX
004F8C2D B9 188D4F00 MOV ECX,fcpexper.004F8D18
004F8C32 A1 9CC55000 MOV EAX,DWORD PTR DS:[50C59C]
004F8C37 8B00 MOV EAX,DWORD PTR DS:[EAX]
004F8C39 E8 96BAF6FF CALL fcpexper.004646D4 ; 注册码不正确
004F8C3E EB 68 JMP SHORT fcpexper.004F8CA8
004F8C40 68 2C8D4F00 PUSH fcpexper.004F8D2C
004F8C45 8BB3 B8030000 MOV ESI,DWORD PTR DS:[EBX+3B8]
004F8C4B FF76 48 PUSH DWORD PTR DS:[ESI+48]
004F8C4E 68 708D4F00 PUSH fcpexper.004F8D70
004F8C53 68 7C8D4F00 PUSH fcpexper.004F8D7C
004F8C58 FF76 54 PUSH DWORD PTR DS:[ESI+54]
004F8C5B 68 708D4F00 PUSH fcpexper.004F8D70
004F8C60 68 908D4F00 PUSH fcpexper.004F8D90
004F8C65 FF76 5C PUSH DWORD PTR DS:[ESI+5C]
004F8C68 68 708D4F00 PUSH fcpexper.004F8D70
004F8C6D 68 A48D4F00 PUSH fcpexper.004F8DA4
004F8C72 8D45 FC LEA EAX,DWORD PTR SS:[EBP-4]
004F8C75 BA 0A000000 MOV EDX,0A
004F8C7A E8 01BFF0FF CALL fcpexper.00404B80
004F8C7F 6A 40 PUSH 40
004F8C81 8B45 FC MOV EAX,DWORD PTR SS:[EBP-4]
004F8C84 E8 2FC0F0FF CALL fcpexper.00404CB8
004F8C89 8BD0 MOV EDX,EAX
004F8C8B B9 188D4F00 MOV ECX,fcpexper.004F8D18
004F8C90 A1 9CC55000 MOV EAX,DWORD PTR DS:[50C59C]
004F8C95 8B00 MOV EAX,DWORD PTR DS:[EAX]
004F8C97 E8 38BAF6FF CALL fcpexper.004646D4
004F8C9C A1 9CC55000 MOV EAX,DWORD PTR DS:[50C59C]
004F8CA1 8B00 MOV EAX,DWORD PTR DS:[EAX]
004F8CA3 E8 88B9F6FF CALL fcpexper.00464630
004F8CA8 33C0 XOR EAX,EAX
004F8CAA 5A POP EDX
004F8CAB 59 POP ECX
004F8CAC 59 POP ECX
004F8CAD 64:8910 MOV DWORD PTR FS:[EAX],EDX
004F8CB0 68 D28C4F00 PUSH fcpexper.004F8CD2
004F8CB5 8D45 F0 LEA EAX,DWORD PTR SS:[EBP-10]
004F8CB8 BA 03000000 MOV EDX,3
004F8CBD E8 6ABBF0FF CALL fcpexper.0040482C
004F8CC2 8D45 FC LEA EAX,DWORD PTR SS:[EBP-4]
004F8CC5 E8 3EBBF0FF CALL fcpexper.00404808
004F8CCA C3 RETN
F7跟进后代码如下:
004E8EB4 55 PUSH EBP
004E8EB5 8BEC MOV EBP,ESP
004E8EB7 83C4 F0 ADD ESP,-10
004E8EBA 53 PUSH EBX
004E8EBB 33DB XOR EBX,EBX
004E8EBD 895D F0 MOV DWORD PTR SS:[EBP-10],EBX
004E8EC0 895D F4 MOV DWORD PTR SS:[EBP-C],EBX
004E8EC3 894D F8 MOV DWORD PTR SS:[EBP-8],ECX
004E8EC6 8955 FC MOV DWORD PTR SS:[EBP-4],EDX
004E8EC9 8BD8 MOV EBX,EAX
004E8ECB 8B45 FC MOV EAX,DWORD PTR SS:[EBP-4]
004E8ECE E8 D5BDF1FF CALL fcpexper.00404CA8
004E8ED3 8B45 F8 MOV EAX,DWORD PTR SS:[EBP-8]
004E8ED6 E8 CDBDF1FF CALL fcpexper.00404CA8
004E8EDB 8B45 08 MOV EAX,DWORD PTR SS:[EBP+8]
004E8EDE E8 C5BDF1FF CALL fcpexper.00404CA8
004E8EE3 33C0 XOR EAX,EAX
004E8EE5 55 PUSH EBP
004E8EE6 68 9E8F4E00 PUSH fcpexper.004E8F9E
004E8EEB 64:FF30 PUSH DWORD PTR FS:[EAX]
004E8EEE 64:8920 MOV DWORD PTR FS:[EAX],ESP
004E8EF1 8B45 FC MOV EAX,DWORD PTR SS:[EBP-4]
004E8EF4 E8 C7BBF1FF CALL fcpexper.00404AC0
004E8EF9 3B43 4C CMP EAX,DWORD PTR DS:[EBX+4C]
004E8EFC 7F 19 JG SHORT fcpexper.004E8F17
004E8EFE 8B45 FC MOV EAX,DWORD PTR SS:[EBP-4]
004E8F01 E8 BABBF1FF CALL fcpexper.00404AC0
004E8F06 3B43 50 CMP EAX,DWORD PTR DS:[EBX+50]
004E8F09 7C 0C JL SHORT fcpexper.004E8F17
004E8F0B 8B45 08 MOV EAX,DWORD PTR SS:[EBP+8]
004E8F0E E8 ADBBF1FF CALL fcpexper.00404AC0
004E8F13 85C0 TEST EAX,EAX
004E8F15 75 04 JNZ SHORT fcpexper.004E8F1B
004E8F17 33DB XOR EBX,EBX
004E8F19 EB 60 JMP SHORT fcpexper.004E8F7B
004E8F1B 8D55 F4 LEA EDX,DWORD PTR SS:[EBP-C]
004E8F1E 8B45 08 MOV EAX,DWORD PTR SS:[EBP+8]
004E8F21 E8 BEFEF1FF CALL fcpexper.00408DE4
004E8F26 8B55 F4 MOV EDX,DWORD PTR SS:[EBP-C]
004E8F29 8D45 08 LEA EAX,DWORD PTR SS:[EBP+8]
004E8F2C E8 6FB9F1FF CALL fcpexper.004048A0
004E8F31 8D4D F0 LEA ECX,DWORD PTR SS:[EBP-10]
004E8F34 8B55 FC MOV EDX,DWORD PTR SS:[EBP-4]
004E8F37 8BC3 MOV EAX,EBX
004E8F39 E8 BAFBFFFF CALL fcpexper.004E8AF8
004E8F3E 8B45 F0 MOV EAX,DWORD PTR SS:[EBP-10]
004E8F41 8B55 08 MOV EDX,DWORD PTR SS:[EBP+8] ; 寄存器出现注册码
004E8F44 E8 13FFF1FF CALL fcpexper.00408E5C ; 假码真码比较
004E8F49 85C0 TEST EAX,EAX
004E8F4B 74 04 JE SHORT fcpexper.004E8F51
004E8F4D 33DB XOR EBX,EBX
004E8F4F EB 2A JMP SHORT fcpexper.004E8F7B
004E8F51 8D43 48 LEA EAX,DWORD PTR DS:[EBX+48]
004E8F54 8B55 FC MOV EDX,DWORD PTR SS:[EBP-4]
004E8F57 E8 00B9F1FF CALL fcpexper.0040485C
004E8F5C 8D43 54 LEA EAX,DWORD PTR DS:[EBX+54]
004E8F5F 8B55 F8 MOV EDX,DWORD PTR SS:[EBP-8]
004E8F62 E8 F5B8F1FF CALL fcpexper.0040485C
004E8F67 8D43 5C LEA EAX,DWORD PTR DS:[EBX+5C]
004E8F6A 8B55 08 MOV EDX,DWORD PTR SS:[EBP+8]
004E8F6D E8 EAB8F1FF CALL fcpexper.0040485C
004E8F72 8BC3 MOV EAX,EBX
004E8F74 E8 DF010000 CALL fcpexper.004E9158
004E8F79 B3 01 MOV BL,1
004E8F7B 33C0 XOR EAX,EAX
004E8F7D 5A POP EDX
004E8F7E 59 POP ECX
004E8F7F 59 POP ECX
004E8F80 64:8910 MOV DWORD PTR FS:[EAX],EDX
004E8F83 68 A58F4E00 PUSH fcpexper.004E8FA5
004E8F88 8D45 F0 LEA EAX,DWORD PTR SS:[EBP-10]
004E8F8B BA 04000000 MOV EDX,4
004E8F90 E8 97B8F1FF CALL fcpexper.0040482C
004E8F95 8D45 08 LEA EAX,DWORD PTR SS:[EBP+8]
004E8F98 E8 6BB8F1FF CALL fcpexper.00404808
004E8F9D C3 RETN
好追码结果如下:
用户名:i386 Information Security Team Of China
注册码:065692701E
哈哈,不知偶菜菜想玩玩啊这破文是否比发原创区的那个用户和注册码更有含金量,嗯,不好意思哦,偶不是对那位兄弟有意见哈,请见谅,做错了打偶PP^_^!嗯,还是那句话,吾爱破解,那群大大,大大的好。偶菜菜飞呀飞,就来这里跟大大的学习了,哈哈,大家也一起来玩吧!嗯,本想做过屏幕录像照顾下新手朋友的,实在是有点晚了,破文就够了吧,偶明早还得早起奋斗哦。再见呀!
2008.04.21