【文章标题】: CrackMe-2
【软件名称】: CKme
【软件大小】: 405KB
【下载地址】: 自己搜索下载
【加壳方式】: 无
【保护方式】: Name/Serial
【编写语言】: (Delphi)
【使用工具】: OD
【操作平台】: xp sp3
【软件介绍】: 无聊
【作者声明】: 只是感兴趣,没有其他目的。失误之处敬请诸位大侠赐教!
--------------------------------------------------------------------------------
【详细过程】
地址 反汇编 文本字符串
00457BD9 mov edx,CKme.00457C18 黑头Sun Bird
00457BE9 mov edx,CKme.00457C30 dseloffc-012-OK
00457EAE mov eax,dword ptr ss:[ebp-0xC] 用户名
00457EF0 cmp ebx,0x13 比较 ebx
00457FEA mov eax,dword ptr ss:[ebp-0xC] 用户名
004580A9 mov edx,CKme.00458114 恭喜恭喜!注册成功
双击进入004580A9,
00457FB8 55 push ebp
00457FB9 8BEC mov ebp,esp
00457FBB B9 04000000 mov ecx,0x4
00457FC0 6A 00 push 0x0
00457FC2 6A 00 push 0x0
00457FC4 49 dec ecx
00457FC5 ^ 75 F9 jnz short CKme.00457FC0
00457FC7 51 push ecx
00457FC8 53 push ebx
00457FC9 56 push esi
00457FCA 8BF0 mov esi,eax
00457FCC 33C0 xor eax,eax
00457FCE 55 push ebp
00457FCF 68 FD804500 push CKme.004580FD
00457FD4 64:FF30 push dword ptr fs:[eax]
00457FD7 64:8920 mov dword ptr fs:[eax],esp
00457FDA 33DB xor ebx,ebx
00457FDC 8D55 F4 lea edx,dword ptr ss:[ebp-0xC]
00457FDF 8B86 D4020000 mov eax,dword ptr ds:[esi+0x2D4]
00457FE5 E8 5EB3FCFF call CKme.00423348
00457FEA 8B45 F4 mov eax,dword ptr ss:[ebp-0xC] ;
00457FED E8 8ABBFAFF call CKme.00403B7C
00457FF2 83C0 1E add eax,0x1E
00457FF5 8D55 F8 lea edx,dword ptr ss:[ebp-0x8]
00457FF8 E8 07FBFAFF call CKme.00407B04
00457FFD FF75 F8 push dword ptr ss:[ebp-0x8]
00458000 8D55 F0 lea edx,dword ptr ss:[ebp-0x10]
00458003 8B86 D4020000 mov eax,dword ptr ds:[esi+0x2D4]
00458009 E8 3AB3FCFF call CKme.00423348
0045800E FF75 F0 push dword ptr ss:[ebp-0x10]
00458011 8D55 EC lea edx,dword ptr ss:[ebp-0x14]
00458014 8BC3 mov eax,ebx
00458016 E8 E9FAFAFF call CKme.00407B04
0045801B FF75 EC push dword ptr ss:[ebp-0x14]
0045801E 8D45 FC lea eax,dword ptr ss:[ebp-0x4]
00458021 BA 03000000 mov edx,0x3
00458026 E8 11BCFAFF call CKme.00403C3C
0045802B 43 inc ebx
0045802C 83FB 13 cmp ebx,0x13
0045802F ^ 75 AB jnz short CKme.00457FDC
00458031 81BE 0C030000 8>cmp dword ptr ds:[esi+0x30C],0x85
0045803B 75 76 jnz short CKme.004580B3 将JNZ改成JE,75改74.爆破完成
0045803D 33DB xor ebx,ebx
0045803F 8D55 E4 lea edx,dword ptr ss:[ebp-0x1C]
00458042 8B86 D4020000 mov eax,dword ptr ds:[esi+0x2D4]
00458048 E8 FBB2FCFF call CKme.00423348
0045804D 8B45 E4 mov eax,dword ptr ss:[ebp-0x1C]
00458050 E8 27BBFAFF call CKme.00403B7C
00458055 83C0 03 add eax,0x3
00458058 8D55 E8 lea edx,dword ptr ss:[ebp-0x18]
0045805B E8 A4FAFAFF call CKme.00407B04
00458060 FF75 E8 push dword ptr ss:[ebp-0x18]
00458063 8D55 E0 lea edx,dword ptr ss:[ebp-0x20]
00458066 8B86 D4020000 mov eax,dword ptr ds:[esi+0x2D4]
0045806C E8 D7B2FCFF call CKme.00423348
00458071 FF75 E0 push dword ptr ss:[ebp-0x20]
00458074 8D55 DC lea edx,dword ptr ss:[ebp-0x24]
00458077 8BC3 mov eax,ebx
00458079 E8 86FAFAFF call CKme.00407B04
0045807E FF75 DC push dword ptr ss:[ebp-0x24]
00458081 8D45 FC lea eax,dword ptr ss:[ebp-0x4]
00458084 BA 03000000 mov edx,0x3
00458089 E8 AEBBFAFF call CKme.00403C3C
0045808E 43 inc ebx
0045808F 83FB 13 cmp ebx,0x13
00458092 ^ 75 AB jnz short CKme.0045803F
00458094 33D2 xor edx,edx
00458096 8B86 F0020000 mov eax,dword ptr ds:[esi+0x2F0]
0045809C E8 BFB1FCFF call CKme.00423260
004580A1 A1 20B84500 mov eax,dword ptr ds:[0x45B820]
004580A6 83C0 70 add eax,0x70
004580A9 BA 14814500 mov edx,CKme.00458114 ; 恭喜恭喜!注册成功
004580AE E8 9DB8FAFF call CKme.00403950
004580B3 33C0 xor eax,eax
004580B5 5A pop edx
004580B6 59 pop ecx
004580B7 59 pop ecx
004580B8 64:8910 mov dword ptr fs:[eax],edx
004580BB 68 04814500 push CKme.00458104
004580C0 8D45 DC lea eax,dword ptr ss:[ebp-0x24]
004580C3 E8 34B8FAFF call CKme.004038FC
004580C8 8D45 E0 lea eax,dword ptr ss:[ebp-0x20]
004580CB BA 02000000 mov edx,0x2
004580D0 E8 4BB8FAFF call CKme.00403920
004580D5 8D45 E8 lea eax,dword ptr ss:[ebp-0x18]
004580D8 BA 02000000 mov edx,0x2
004580DD E8 3EB8FAFF call CKme.00403920
004580E2 8D45 F0 lea eax,dword ptr ss:[ebp-0x10]
004580E5 BA 02000000 mov edx,0x2
004580EA E8 31B8FAFF call CKme.00403920
004580EF 8D45 F8 lea eax,dword ptr ss:[ebp-0x8]
004580F2 BA 02000000 mov edx,0x2
004580F7 E8 24B8FAFF call CKme.00403920
004580FC C3 retn
--------------------------------------------------------------------------------
【经验总结】
0045803B 75 76 jnz short CKme.004580B3 将JNZ改成JE,75改74.爆破完成
心情不爽,到此结束.
--------------------------------------------------------------------------------
【版权声明】: 本文原创于无聊之人, 转载请注明作者并保持文章的完整, 谢谢!
2014年01月12日 下午 06:37:52
|