本帖最后由 20120427 于 2013-12-15 13:02 编辑
发个成功图。。只会爆破
讲解下爆破分析
本程序关键:
00401CA1 B8 B0194000 mov eax,KeyGenMe.004019B0 //失败
00401CA6 . 5F pop edi
00401CA7 . A3 0C414000 mov dword ptr ds:[0x40410C],eax //失败
00401CAC . A3 10414000 mov dword ptr ds:[0x404110],eax //失败
00401CB1 . C705 14414000>mov dword ptr ds:[0x404114],KeyGenMe.004017F0 //成功
00401CBB . B8 01000000 mov eax,0x1
00401CC0 . 5E pop esi
满足 用户名 5位 注册码 12位
00401FB3 . FF1485 0C4140>call dword ptr ds:[eax*4+0x40410C] //此时eax 为2就破解成功
00401FAA . E8 F1F7FFFF call KeyGenMe.004017A0 //很明显啦,这个就是关键call, 成功eax就等于1,失败等于0
00401FB2 40 inc eax // eax加1
[AppleScript] 纯文本查看 复制代码 004018BA . B1 3E mov cl,0x3E
004018BC . B0 37 mov al,0x37
004018BE . C64424 14 72 mov byte ptr ss:[esp+0x14],0x72
004018C3 . C64424 15 40 mov byte ptr ss:[esp+0x15],0x40
004018C8 . C64424 16 35 mov byte ptr ss:[esp+0x16],0x35
004018CD . C64424 17 0E mov byte ptr ss:[esp+0x17],0xE
004018D2 . 884C24 18 mov byte ptr ss:[esp+0x18],cl
004018D6 . C64424 19 48 mov byte ptr ss:[esp+0x19],0x48
004018DB . C64424 1A A3 mov byte ptr ss:[esp+0x1A],0xA3
004018E0 . C64424 1B 99 mov byte ptr ss:[esp+0x1B],0x99
004018E5 . C64424 1C F9 mov byte ptr ss:[esp+0x1C],0xF9
004018EA . C64424 1D 49 mov byte ptr ss:[esp+0x1D],0x49
004018EF . 884424 1E mov byte ptr ss:[esp+0x1E],al
004018F3 . C64424 1F 2B mov byte ptr ss:[esp+0x1F],0x2B
004018F8 . C64424 20 42 mov byte ptr ss:[esp+0x20],0x42
004018FD . C64424 21 9E mov byte ptr ss:[esp+0x21],0x9E
00401902 . C64424 22 80 mov byte ptr ss:[esp+0x22],0x80
00401907 . C64424 23 9A mov byte ptr ss:[esp+0x23],0x9A
0040190C . C64424 24 DA mov byte ptr ss:[esp+0x24],0xDA
00401911 . C64424 25 8E mov byte ptr ss:[esp+0x25],0x8E
00401916 . C64424 26 DE mov byte ptr ss:[esp+0x26],0xDE
0040191B . C64424 27 B3 mov byte ptr ss:[esp+0x27],0xB3
00401920 . C64424 28 8D mov byte ptr ss:[esp+0x28],0x8D
00401925 . C64424 29 BB mov byte ptr ss:[esp+0x29],0xBB
0040192A . C64424 2A 7A mov byte ptr ss:[esp+0x2A],0x7A
0040192F . 884424 2B mov byte ptr ss:[esp+0x2B],al
00401933 . C64424 2C 1D mov byte ptr ss:[esp+0x2C],0x1D
00401938 . 884C24 2D mov byte ptr ss:[esp+0x2D],cl
0040193C . C64424 2E 14 mov byte ptr ss:[esp+0x2E],0x14
|