文章导航PC6首页软件下载单机游戏安卓资源苹果资源

pc软件新闻网络操作系统办公工具编程服务器软件评测

安卓新闻资讯应用教程刷机教程安卓游戏攻略tv资讯深度阅读综合安卓评测

苹果ios资讯苹果手机越狱备份教程美化教程ios软件教程mac教程

单机游戏角色扮演即时战略动作射击棋牌游戏体育竞技模拟经营其它游戏游戏工具

网游cf活动dnf活动lol周免英雄lol礼包

手游最新动态手游评测手游活动新游预告手游问答

您的位置:首页精文荟萃破解文章 → 某交通客运信息管理系统

某交通客运信息管理系统

时间:2004/10/15 1:03:00来源:本站整理作者:蓝点我要评论(0)

 





 

 








【软件名称】某交通客运信息管理系统
【软件限制】注册码+加密狗
【破解声明】破解只是感兴趣,无其它目的。失误之处敬请诸位大侠赐教!
【破解工具】W32Dasm8.93 TRW20001.23
========================================================================================
【分析过程】

   此软件不注册运行在试用版功能,注册后加密狗启动,程序无法运行.
我只找了一下注册码,没有详细分析算法.主要把加密狗解除思路写一下.
分析如下:

* Possible StringData Ref from Code Obj ->"197712280530qlm提示窗口"
                                 |
:0062365A BAA8376200              mov edx, 006237A8
:0062365F E8F4BCECFF              call 004EF358
:00623664 8D95F0FEFFFF            lea edx, dword ptr [ebp+FFFFFEF0]
:0062366A 8B83F4020000            mov eax, dword ptr [ebx+000002F4]
:00623670 E843B2E2FF              call 0044E8B8
:00623675 8B85F0FEFFFF            mov eax, dword ptr [ebp+FFFFFEF0]
:0062367B 8D95F4FEFFFF            lea edx, dword ptr [ebp+FFFFFEF4]
:00623681 E8525FDEFF              call 004095D8
:00623686 8B85F4FEFFFF            mov eax, dword ptr [ebp+FFFFFEF4]
:0062368C 50                      push eax
:0062368D 8D95ECFEFFFF            lea edx, dword ptr [ebp+FFFFFEEC]
:00623693 8B45FC                  mov eax, dword ptr [ebp-04]
:00623696 E83D5FDEFF              call 004095D8
:0062369B 8B95ECFEFFFF            mov edx, dword ptr [ebp+FFFFFEEC] //注册码 算法省略...
:006236A1 58                      pop eax
:006236A2 E85119DEFF              call 00404FF8
:006236A7 743B                    je 006236E4
:006236A9 6A40                    push 00000040
:006236AB B9B8376200              mov ecx, 006237B8

* Possible StringData Ref from Code Obj ->"您输入的注册号错误,请重新输入."
                                 |
:006236B0 BAC4376200              mov edx, 006237C4
:006236B5 A140426300              mov eax, dword ptr [00634240]
:006236BA 8B00                    mov eax, dword ptr [eax]
:006236BC E827B7E4FF              call 0046EDE8
:006236C1 8B83F4020000            mov eax, dword ptr [ebx+000002F4]
:006236C7 66BEB8FF                mov si, FFB8
:006236CB E8DC08DEFF              call 00403FAC
:006236D0 84C0                    test al, al
:006236D2 747E                    je 00623752
:006236D4 8B83F4020000            mov eax, dword ptr [ebx+000002F4]
:006236DA 8B10                    mov edx, dword ptr [eax]
:006236DC FF92C0000000            call dword ptr [edx+000000C0]
:006236E2 EB6E                    jmp 00623752

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:006236A7(C)
|
:006236E4 8BC3                    mov eax, ebx
:006236E6 E891010000              call 0062387C
:006236EB 84C0                    test al, al      
:006236ED 744B                    je 0062373A    //不能跳
:006236EF 6A40                    push 00000040
:006236F1 B9B8376200              mov ecx, 006237B8

* Possible StringData Ref from Code Obj ->"恭喜您注册成功,欢迎使用状元正版软件。
请重新

====================================================================================
* Possible StringData Ref from Code Obj ->" 试用版 V5.0 "
                                 |
:00628870 BA048E6200              mov edx, 00628E04
:00628875 E86E60E2FF              call 0044E8E8
:0062887A E9D3040000              jmp 00628D52

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00628865(C)
|
:0062887F 8B45FC                  mov eax, dword ptr [ebp-04]
:00628882 8B8000030000            mov eax, dword ptr [eax+00000300]

* Possible StringData Ref from Code Obj ->" 正试版  V5.0 "
                                 |
:00628888 BA1C8E6200              mov edx, 00628E1C
:0062888D E85660E2FF              call 0044E8E8
:00628892 A15C656300              mov eax, dword ptr [0063655C]
:00628897 8B80FC020000            mov eax, dword ptr [eax+000002FC]

* Possible StringData Ref from Code Obj ->"系统正在检测加密狗,请等待。。。"
                                 |
:0062889D BA348E6200              mov edx, 00628E34
:006288A2 E84160E2FF              call 0044E8E8
:006288A7 33C0                    xor eax, eax
:006288A9 A34C656300              mov dword ptr [0063654C], eax
:006288AE E8AD4E0000              call 0062D760     //在这里读狗  杀入.....
:006288B3 8BD8                    mov ebx, eax      //返回eax=0表明有狗
:006288B5 85DB                    test ebx, ebx     //ebx必须等于0  
:006288B7 7428                    je 006288E1       //跳走就成功了,简单的爆破可能会有隐患,因此我们必须进入上面的call观察
:006288B9 33D2                    xor edx, edx

* Possible StringData Ref from Code Obj ->"    系统检测加密狗失败!可能是网络不通或加密狗"
                                       ->"未安装正确!
   请先进行调试后再运行本系统!
"
                                       ->"    如果您仍无法解决,请与供应商联系!"
                                 |
:006288BB B8608E6200              mov eax, 00628E60
:006288C0 E80B5DECFF              call 004EE5D0
:006288C5 8B45FC                  mov eax, dword ptr [ebp-04]
:006288C8 8B80FC020000            mov eax, dword ptr [eax+000002FC]

* Possible StringData Ref from Code Obj ->"加载加密狗失败!"
                                 |
:006288CE BAEC8E6200              mov edx, 00628EEC
:006288D3 E81060E2FF              call 0044E8E8
:006288D8 C645FB00                mov [ebp-05], 00
:006288DC E971040000              jmp 00628D52

=====================================call 0062D760 ===================================
* Referenced by a CALL at Address:
|:006288AE   

:0062D760 55                      push ebp
:0062D761 8BEC                    mov ebp, esp
:0062D763 52                      push edx
:0062D764 51                      push ecx
:0062D765 6846D76200              push 0062D746
:0062D76A 68C1D46200              push 0062D4C1
:0062D76F 6A01                    push 00000001
:0062D771 E829F6FFFF              call 0062CD9F         //读狗
:0062D776 83C40C                  add esp, 0000000C
:0062D779 59                      pop ecx
:0062D77A 5A                      pop edx
:0062D77B 5D                      pop ebp
:0062D77C C3                      ret

:0062D77D 55                      push ebp
:0062D77E 8BEC                    mov ebp, esp
:0062D780 52                      push edx
:0062D781 51                      push ecx
:0062D782 6846D76200              push 0062D746
:0062D787 68C1D46200              push 0062D4C1
:0062D78C 6A05                    push 00000005
:0062D78E E80CF6FFFF              call 0062CD9F        //读狗
:0062D793 83C40C                  add esp, 0000000C
:0062D796 59                      pop ecx
:0062D797 5A                      pop edx
:0062D798 5D                      pop ebp
:0062D799 C3                      ret

:0062D79A 55                      push ebp
:0062D79B 8BEC                    mov ebp, esp
:0062D79D 52                      push edx
:0062D79E 51                      push ecx
:0062D79F 6846D76200              push 0062D746
:0062D7A4 68C1D46200              push 0062D4C1
:0062D7A9 6A02                    push 00000002
:0062D7AB E8EFF5FFFF              call 0062CD9F        //读狗
:0062D7B0 83C40C                  add esp, 0000000C
:0062D7B3 59                      pop ecx
:0062D7B4 5A                      pop edx
:0062D7B5 85C0                    test eax, eax
:0062D7B7 750A                    jne 0062D7C3
:0062D7B9 8B1558656300            mov edx, dword ptr [00636558]
:0062D7BF 33C9                    xor ecx, ecx
:0062D7C1 890A                    mov dword ptr [edx], ecx

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0062D7B7(C)
|
:0062D7C3 5D                      pop ebp
:0062D7C4 C3                      ret

* Referenced by a CALL at Addresses:
|:006288FE   , :006289FE   , :00628B18   , :00628C35   
|
:0062D7C5 55                      push ebp
:0062D7C6 8BEC                    mov ebp, esp
:0062D7C8 52                      push edx
:0062D7C9 51                      push ecx
:0062D7CA 6846D76200              push 0062D746
:0062D7CF 68C1D46200              push 0062D4C1
:0062D7D4 6A03                    push 00000003
:0062D7D6 E8C4F5FFFF              call 0062CD9F   //读狗
:0062D7DB 83C40C                  add esp, 0000000C
:0062D7DE 59                      pop ecx
:0062D7DF 5A                      pop edx
:0062D7E0 5D                      pop ebp
:0062D7E1 C3                      ret

从上面可以看出有不少地方在读狗.....进入call 0062CD9F

=======================================call 0062CD9F=========================================
* Referenced by a CALL at Addresses:
|:0062D771   , :0062D78E   , :0062D7AB   , :0062D7D6   
|
:0062CD9F 55                      push ebp   //修改为xor eax,eax   ret //在这里让eax返回0就成功了
:0062CDA0 8BEC                    mov ebp, esp
:0062CDA2 83C4B8                  add esp, FFFFFFB8
:0062CDA5 53                      push ebx
:0062CDA6 56                      push esi
:0062CDA7 E8EEFEFFFF              call 0062CC9A
:0062CDAC 8945DC                  mov dword ptr [ebp-24], eax
:0062CDAF 66C745D00A00            mov [ebp-30], 000A
:0062CDB5 E9F0030000              jmp 0062D1AA
:0062CDBA EB01                    jmp 0062CDBD
:0062CDBC 00                      BYTE 00

========================================================================================
【分析总结】
      
      这个加密狗不是很复杂,只要让读狗后返回0解狗即可成功,采用一追到底的方法,到程序的
根部修改,而不是简单的修改跳转.好处是可以避免许多暗桩.
      初学解狗希望对大家有所帮助,也希望起到抛砖引玉.
========================================================================================

    
    
     
    
    
     

相关阅读 Windows错误代码大全 Windows错误代码查询激活windows有什么用Mac QQ和Windows QQ聊天记录怎么合并 Mac QQ和Windows QQ聊天记录Windows 10自动更新怎么关闭 如何关闭Windows 10自动更新windows 10 rs4快速预览版17017下载错误问题Win10秋季创意者更新16291更新了什么 win10 16291更新内容windows10秋季创意者更新时间 windows10秋季创意者更新内容kb3150513补丁更新了什么 Windows 10补丁kb3150513是什么

文章评论
发表评论

热门文章 去除winrar注册框方法

最新文章 比特币病毒怎么破解 比去除winrar注册框方法 华为无线路由器HG522-C破解教程(附超级密码JEB格式文件京东电子书下载和阅读限制破解教UltraISO注册码全集(最新)通过Access破解MSSQL获得数据

人气排行 华为无线路由器HG522-C破解教程(附超级密码JEB格式文件京东电子书下载和阅读限制破解教UltraISO注册码全集(最新)qq相册密码破解方法去除winrar注册框方法(适应任何版本)怎么用手机破解收费游戏华为无线猫HG522破解如何给软件脱壳基础教程