| |||||||||||||||||||||||||||||
¡¾ÖÆ×÷³ÉÔ±¡¿³ÌʽÁÔÈË | |||||||||||||||||||||||||||||
¡¾·¢ÐÐʱ¼ä¡¿2000-8-26 | |||||||||||||||||||||||||||||
¡¾ÆÚ¿¯ºÅÂë¡¿µÚ¾ÅÆÚ | |||||||||||||||||||||||||||||
¡¾ÍøÕ¾µØÖ·¡¿http://programhunter.go.163.com | |||||||||||||||||||||||||||||
¡¾±à¼¼ÄÓï¡¿ | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
¡¾Ä¿ ÿÿ ¼¡¿ | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
&¡¾ÆƽâÐĵá¿ | |||||||||||||||||||||||||||||
Green Tea 2.60×¢²áÂëËã·¨ ÎÄÕÂ×÷Õߣºwind[CCG] ×÷ÕßÖ÷Ò³£ºhttp://biggow.8u8.com ×÷ÕßE-mail:biggow@eastday.com »¶ÓתÔØ£¬µ«Çë±£³ÖÔÎÄÍêÕûÐÔ£¡ ¿´Íê´ËÎÄ£¬Ï£Íû´ó¼Ò¿ÉÒÔд³ö×¢²á»ú£¬Ó¦¸Ã²»ÊǺÜÄÑ£¡ :0046A029 E8EE9BF9FF call 00403C1C :0046A02E 8BD0 mov edx, eax :0046A030 85D2 test edx, edx :0046A032 7E14 jle 0046A048 :0046A034 B801000000 mov eax, 00000001 * Referenced by a (U)nconditional or (C)onditional Jump at Address: |:0046A046(C) | :0046A039 8B4DF0 mov ecx, dword ptr [ebp-10] :0046A03C 0FB64C01FF movzx ecx, byte ptr [ecx+eax-01] :0046A041 0FAFD9 imul ebx, ecx :0046A044 40 inc eax :0046A045 4A dec edx :0046A046 75F1 jne 0046A039 ------------------------->ÉÏÃæÕâ¶Î³ÌÐò£¬Êǽ«ÄãÊäÈëµÄ×¢²áÃû£¬°Ñ×¢²áÃûÿ¸ö×Ö·ûµÄAsciiÂëËã³ö È»ºó£¬½«Ã¿¸ö×Ö·ûµÄAsciiÂëÏà³Ë£¬µÃµ½Ò»¸ö»ý£¨ÔÚÕâÀï¸øÕâ¸ö³Ë»ýÈ¡Ò»¸ö±äÁ¿ÃûS) * Referenced by a (U)nconditional or (C)onditional Jump at Address: |:0046A032(C) | :0046A048 83C364 add ebx, 00000064------->¾ÍÊǰѳ˻ýS¼ÓÉÏ64, ¼ÙÉèA=S+64£¨ÕâÀﶼÊÇÊ®Áù½øÖÆÊý£© :0046A04B 8BC3 mov eax, ebx-------->°ÑËã³öµÄAÒÆÈë¼Ä´æÆ÷eaxÖУ¡ :0046A04D 99 cdq-------->ÅжÏeaxÖеÄÖµÊÇ·ñ´óÓÚ80000000,Èç¹û´óÓÚ80000000ÄÇô edx=ffffffff,·´Ö®£¬edx=00000000 :0046A04E 33C2 xor eax, edx------>°ÑeaxºÍedx×öÒì»ò²Ù×÷£¬Ò²¾ÍÊÇ°ÑA±äÁ¿µÄÖµºÍ ffffffff»ò00000000×÷Òì»ò²Ù×÷ Èç¹ûedx=00000000µÄ»°,Òì»òºóeaxµÄÖµ±£³Ö ²»±ä! :0046A050 2BC2 sub eax, edx------->eax=eax-edx,Ò²¾ÍÊÇ°ÑÒì»ò³öÀ´µÄ ֵȥ¼õFFFFFFFF»ò00000000 ¹ûedx=00000000µÄ»°,eaxµÄÖµ±£³Ö²»±ä :0046A052 8BF8 mov edi, eax :0046A054 8BC7 mov eax, edi :0046A056 8D951CFEFFFF lea edx, dword ptr [ebp+FFFFFE1C] :0046A05C E813D0F9FF call 00407074 :0046A061 8B951CFEFFFF mov edx, dword ptr [ebp+FFFFFE1C] :0046A067 8B86F8010000 mov eax, dword ptr [esi+000001F8] Ëã·¨×ܽ᣺Õâ¸öÈí¼þµÄ×¢²á²¿·Ö¾ÍÊÇ°ÑÄãÊäÈëµÄ×¢²áÃûµÄÿ¸ö×Ö·û¶¼×ª³ÉÏàÓ¦µÄAsciiÂ룡 È»ºó£¬°Ñÿ¸ö×Ö·ûµÄAsciiÂëÏà³Ë£¬µÃµ½Õâ¸ö³Ë»ýS,ÔÙ°ÑËü¼ÓÉÏ64£¬È»ºó°ÑÕâ¸öÖµ·Åµ½eaxÖУ¬È»ºó ÓÃcdqÕâ¸öÖ¸ÁîÀ´ÅжÏeaxµÄÖµÊÇ·ñ´óÓÚ80000000,Èç¹û´óÓÚ£¬ÄÇôedx=ffffffff£¬·ñÔò£¬ edx=00000000 È»ºó£¬°ÑeaxÒ²¾ÍÊÇAºÍ00000000»òffffffff×öÒì»ò£¬°ÑÒì»ò³öÀ´µÄÖµ·Åµ½eaxÀïÈ¥£¡ ÔÙÓÃeaxµÄֵȥ¼õÈ¥ÁËedxÒ²¾ÍÊÇ00000000»òffffffff! Ö´ÐÐcdqÕâ¸öÖ¸ÁîµÄʱºò£¬eaxСÓÚ80000000£¬ÄÇôedx=00000000,ÄÇôÕâ¸öAת»»³ÉÊ®½øÖÆ Êýºó¾ÍÊÇ×¢²áÂ룡 ΪÁË˵Ã÷Çå³þ£¬¾Í¾Ù¸ö¼òµ¥µÄÀý×Ó: ÎÒÒªµÄ×¢²áÃû£ºwind Ҫת»»µÄ×Ö·û£º w i n d Ascii£º 77 69 6E 64 chengji=77*69*6E*64;ÓüÆËãÆ÷¼ÆË㣬µÃµ½chengji=8313E88 zonghe=chengji+64;¼ÆËãºóµÃµ½zonghe=8313EEC ÓÉÓÚ8313EECСÓÚ80000000£¬ËùÒÔ£¬edx=00000000 ÓÉÓÚºÍ00000000Òì»ò(ºóÃæµÄsub eax,edx,Ò»¸öÊý¼õ0µ±È»²»±äÀ²!)£¬ËùÒÔ,zonghe²»±ä£¬ÈÔÈ»µÈÓÚ8313EEC ½«8313EECת»»³ÉÊ®½øÖÆÊý¾ÍÊÇ×¢²áÂë 8313EECת³ÉÊ®½øÖÆΪ137445100 ×îºóÕûÀí³ö ×¢²áÃû:wind ×¢²áÂ룺137445100 Èç¹ûzongheÕâ¸ö±äÁ¿´óÓÚ80000000µÄ»°£¬edx=ffffffff,¾ÍÊÇ˵Òì»òºóµÄÖµ»á¸Ä±ä£¡ »¹ÓÐ×îºóÒª¼ÓÉÏ1(ÒòΪsub eax,edxÂë!) xor(Òì»ò):Ò²¾ÍÊDZØÐëÁ½¸öÏà·´µÄÊý²Å»áµÃ1,Ö»ÓÐ0ºÍ1³öÏÖµÄʱºò£¬½á¹û²Å»áΪ1£¬Èç¹ûÊÇ0ºÍ0»òÕß1ºÍ1 Õâ¸ö½á¹ûÖ»ÄÜÊÇ0! ºÜ¾ÃûÓÐ䶫Î÷ÁË£¬Ï£Íû´ó¼Ò¶ÔÎÒ´Ö²ÚµÄÎıʱíʾÁ½⣬ҲϣÍû´ó¼ÒÄܹ»Ã÷°×ÎÒµÄÒâ˼! Èç¹ûÄã¶ÁÁËÕâƪÎÄÕÂÖ®ºó£¬Ð´³öÁË×¢²á»ú£¬±ðÍüÁË£¬ÌáÒ»ÏÂÎÒµÄÃû×Ö:wind[CCG] ÒÔ¼°ÎÒµÄÍøÕ¾:biggow.8u8.com!Ðû´«Ò»ÏÂ! wind China Cracking Group 2000.7.16. | |||||||||||||||||||||||||||||
·µ»Ø | |||||||||||||||||||||||||||||
Winamp 2.04 Æô¶¯winamp.exe 1. °Ñ¿ª¹ØÓÚ¡±wiamp¡±,Ñ¡Shareware. 2. °´ Enter Registration Info 3. Name: Peter Reg#:78787878 4. Ctrl+N 5. bpx getdlgitemtexta 6. °´ x ·µ»Ø ÔÙÊäÈëÒ»¸öÊýѧ(ÎÒÓá±9¡±) 7. ÓÖ±»À¹×è,µ½Ò»¸ö¡±User32!Getdlgitemtexta 8. F10,22´Î 9. Äã»á¿´¼û 0167:0041EF81 PUSH EAX 10. ÎÒÓà d eax Ò»¿´ÓÐ PeterÎÒ×ÖÑÛ£¬ÎҾͶ¨±È½ÏµØ·½Ò»¶¨ÔÚ²»Ô¶µÄµØ·½¡£ 11. ±¾ÈË»ã±à²»ºÃ£¬Ö»ÊÇÖªµÀPush eax¡£´ó¸ÅÊÇÊäÈë×Ö·ûµ½eaxÖС£ÒªÊäÈë×Ö·û²» ¾ÍÊÇÒªÓõÄÃû×Ö£¬dÁËһϹûÈ»ÊÇ¡£ 12. ÔÙÍùÏ¿´: 0167:0041EF82 CALL 0042218 (Ò²ÐíÊDZȱȽϵĵط½) 0167:0041EF87 ADD ESP,BYTE+04 0167:0041EF8A CMP EAX,ESI 0167:0041EF8C JNZ 0041EF97 13. ÏëһϸղÅÎÒÆƽâwinamp skin maker v1.2ʱ£¬²»ÓÃÊÇÓÃSun Bird·ÒëÁËv1.05×ÊÁÏÖÐ 14. ²»ÊÇÓС±CMP EAX,ESI¡± ²»ÊÇÓÃd¶øÓã¿ 15. ÊÔÒ»ÊÔ£º 16. ? EAX 17. DEC=67972642(»á²»»áÊÇ×¢²áÂ룿) 18. HEX=40d2e22 19. ? EDI 20. DEC=787878789(²»ÊÇÎÒ¸Õ²ÅÓõļÙÂ룿) 21. HEX=2ef61385 22. CMP EAX,ESI(²»¾ÍÊÇÁ½¸ö¼Ç´æÆ÷±È½Ï£¿Òª±È½Ï¾ÍÒ»¶¨ÒªÓÐ×¢²áÂëÂð£¿) 23. ºÃÊÔһϣ¬¹ûÈ»ÊÇ¡£Yeah! 24. ÎÒÔÙÊÔһϽøÈë0167:0041EF82 CALL 0042218 (Ò²ÐíÊDZȱȽϵĵط½) 25. ¿ÉÄܱ¾È˼¼Êõ²»ÐУ¬Ö»ÄÜ°××÷¹¤¡£ Õâ²ÅÊDZ¾ÈË×Ô¼ºÆƽâµÄµÚÒ»¸öÈí¼þ£¬¶àлÎÒµÄʦ¸µºÍSun Bird´ó¸ç°ïÖú£¡ ÎÒÊÇÓÃÊÖ´òµÄ£¬0167:0041EF82 CALL 0042218 ¡¡¡. 0167:0041EF8C JNZ 0041EF97 ÓÃtrw2000 or soft-ice,Äܲ»ÄÜcopy³öÀ´ºÍץͼ£¿ | |||||||||||||||||||||||||||||
·µ»Ø | |||||||||||||||||||||||||||||
teleport pro tmÖÐÎÄ°æ °æ±¾1.29 Build 431 Name: Peter com:home sn: 89898989 1. Ï bpx getwindowtexta 2. F12 4Ï 3. F10 24Ï À´µ½ÕâÀï: 0167:00421951 EB4E JMP SHORT 004219A1 0167:00421953 FFB7D5000000 PUSH DWORD [EDI+D5] 0167:00421959 E829090000 CALL 00422287 (Õâ¾ÍÊDZȽϵĵط½) 0167:0042195E 3945EC CMP [EBP-14],EAX(ÕâÊǾÍÊÇ×¢²áÂë±È½Ï) 0167:00421961 59 POP ECX 0167:00421962 0F85E4000000 JNZ NEAR 00421A4C 0167:00421968 8D4DF0 LEA ECX,[EBP-10] 0167:0042196B E8CFE50100 CALL 0043FF3F 0167:00421970 68410C0000 PUSH DWORD 0C41 0167:00421975 8D4DF0 LEA ECX,[EBP-10] 0167:00421978 C745FC02000000 MOV DWORD [EBP-04],02 0167:0042197F E84FEC0100 CALL 004405D3 0167:00421984 53 PUSH EBX 0167:00421985 53 PUSH EBX 0167:00421986 FF75F0 PUSH DWORD [EBP-10] 0167:00421989 C745FC03000000 MOV DWORD [EBP-04],03 0167:00421990 E81B5D0200 CALL 004476B0 0167:00421995 834DFCFF OR DWORD [EBP-04],BYTE -01 0167:00421999 8D4DF0 LEA ECX,[EBP-10] 0167:0042199C E8E9E60100 CALL 0044008A 0167:004219A1 A144BD4700 MOV EAX,[0047BD44] 0167:004219A6 8898AC020000 MOV [EAX+02AC],BL 0167:004219AC A144BD4700 MOV EAX,[0047BD44] 0167:004219B1 8898AD020000 MOV [EAX+02AD],BL 0167:004219B7 A140BD4700 MOV EAX,[0047BD40] 0167:004219BC 3BC3 CMP EAX,EBX 0167:004219BE 7406 JZ 004219C6 0167:004219C0 88985A0F0000 MOV [EAX+0F5A],BL 0167:004219C6 FF75EC PUSH DWORD [EBP-14] 0167:004219C9 8B0D44BD4700 MOV ECX,[0047BD44] 0167:004219CF 6834584700 PUSH DWORD 00475834 0167:004219D4 56 PUSH ESI 0167:004219D5 E8485E0200 CALL 00447822 0167:004219DA FFB7D5000000 PUSH DWORD [EDI+D5] 0167:004219E0 8B0D44BD4700 MOV ECX,[0047BD44] 0167:004219E6 8D9FD5000000 LEA EBX,[EDI+D5] 0167:004219EC 6838574700 PUSH DWORD 00475738 0167:004219F1 56 PUSH ESI 0167:004219F2 E8A05E0200 CALL 00447897 0167:004219F7 FFB7D9000000 PUSH DWORD [EDI+D9] 0167:004219FD 8B0D44BD4700 MOV ECX,[0047BD44] 0167:00421A03 6830574700 PUSH DWORD 00475730 0167:00421A08 56 PUSH ESI 0167:00421A09 E8895E0200 CALL 00447897 0167:00421A0E A144BD4700 MOV EAX,[0047BD44] 0167:00421A13 53 PUSH EBX 0167:00421A14 8D88CE020000 LEA ECX,[EAX+02CE] 0167:00421A1A E864E70100 CALL 00440183 0167:00421A1F 8D87D9000000 LEA EAX,[EDI+D9] 0167:00421A25 50 PUSH EAX 0167:00421A26 A144BD4700 MOV EAX,[0047BD44] 0167:00421A2B 8D88D2020000 LEA ECX,[EAX+02D2] 0167:00421A31 E84DE70100 CALL 00440183 0167:00421A36 8BCF MOV ECX,EDI 0167:00421A38 E85BA90100 CALL 0043C398 0167:00421A3D 8B4DF4 MOV ECX,[EBP-0C] 0167:00421A40 5F POP EDI 0167:00421A41 5E POP ESI 0167:00421A42 64890D00000000 MOV [FS:00],ECX 0167:00421A49 5B POP EBX 0167:00421A4A C9 LEAVE 0167:00421A4B C3 RET 0167:00421A4C 8BBFD5000000 MOV EDI,[EDI+D5] 0167:0042195E 3945EC CMP [EBP-14],EAX µ±¹âÌõ×ßµ½ÕâÀï,¾ÍÓÐ ss:[6FF480]=055BBFED ÎÒ²»ÊǺܻá¼ÆË㣬²»¹ýÎÒÊÔµØÊ®½øÓëÊ®Áù½øÖÆת»»Ì«Âé·³¡£ ÓÃwindowsµÄ¼ÆË㣬Æƽâ½âʱ²»·½±ã¡£ trw2000,soft-ice×Ô´ø¼ÆËãÆ÷¶øÇұȽÏwindows¸ü׼ȷ¡£ ¾ÍÒԸղŵÄ"055bbfed" Ö»ÒªÊäÈë ? 55bbfed Ò»»á¶ù¾Í³öÏÔ(Ê®½øÖÆ) Dec=89898989(Õâ¾ÍÊÇÎÒÓõļÙSn) (Ê®Áù½øÖÆ) Hex=055bbfed ²»ÓÃ˵ÕæµÄµ±ÔÚ"EAX"£¬? EAX £¨Í¬ÉÏÃæµÄ£© CMP [EBP-14],EAX ÓÐÈË¿ÉÄÜÎʲ»ÊÇ? [ebp-14]²Å¶ÔÂ𣿠ss:[6FF480]=055BBFEDÎÒºÃÏñÔÚ»ã±à¿´£¬ÕâÊÇÒ»µÈʽ¡££¨Èç¹ûÓÐÇëÖ¸³ö£¿£© ¾ÍÊÇ[ebp-14]=ss:[6ff480]=055bbfed ²»¾ÍÊÇͬʮ½øÓëÊ®Áù½øÖÆת»»²î²»¶à£¿ Õâ¸öÈí¼þ£¬ÎҺܿì¾ÍÆƽâÍê¹ýÊÇÎÒÆƽâ¹ý³ÌÖÐ×î¿ìµÄ·½·¨¡£ ÎÒ¿ªÊ¼²»ÊÇÏë×Ô¼ºÆƽ⣬ÒòΪºÜ¾ÍÓÐÈËÆƽâÁËÎÒÒ²ÓÐÕâ¸ö½Ì³Ì¡£ ½Ì³ÌÖÐÊÇÓÃbpx hmemcpy,ÎÒÎÞÖÐÏëÊÔÒ»ÏÂbpx getwindowtexta¡£ ½á¹ûÄÜÖжϣ¬²»¾Ã¾ÍCrack it! ×îºó±¾°æ²»Í¬£¬½Ì³ÌµÄºËÐÄÈ«²¿ÁË¡£Ö»ºÃ×Ô¼ºÒ²Ð´Ò»Ï¹ý³Ì¡£ ½Ì³ÌµÄ·½·¨Ò²Ðв»¹ý£¬±È½ÏÂé·³¡£ ÎÒÓÃÐí¶à·½·¨£¬Ò»¿ªÊ¼ÊÇÀûÓÃ×Ô¼ºÒ»µã»ã±à֪ʶ·ÖÎöÆƽâ³öÀ´¡£ ¾ÍÊÇÈÃJNZ,JMP....µÈÌøÔ¾µ½µÄµØ·½ÔÙ·ÖÎö£¬×îºóÀ´ 0167:0042195E 3945EC CMP [EBP-14],EAX ÕâÊǾÍÊÇ×¢²áÂë±È½Ï£¨·ÖÎö³öÀ´£© ¿ÉÒÔ˵ÊÇÎұȽÏ×î¿ìµÄ·½·¨¡£ ×÷Õß:Peter | |||||||||||||||||||||||||||||
·µ»Ø | |||||||||||||||||||||||||||||
--- Cracking WinUGCS v3.0 --- Info: ***** Wow, here I'm again, with my second tut!!! Yahooooo! I will try to make this tut as easy as I can get it. In this tut I'll show U how to use SoftIce when cracking! It's a great tool!! I assume that U have installed SoftIce and its ready to work! PS! When I write something like this 'bpx getdlgitemtexta' I meen it without the 's!! WinUGCS v3.0 should be in this zip file, but if it is NOT, get it here: Www.Heat-On.Com Tools Needed: ************* Hacker's View 6.02 (Http://DiABLO.Freehosting.Net/Dl/Hview602.zip) SoftIce v3.24 (Http://Www.Crosswinds.Net/Oslo/~DaDiABLO/Sice324.zip) The Cracking Begins: ******************** First install WinUGCS, now lets examine it... when U start it, a dialog box pops up, asking for a reg code, nothing more... K, lets start!! Enter 656656 as the code and press Ctrl+D to enter SoftIce. Type in 'bpx getdlgitemtexta'. Now enter 'x' to return to WinUGCS. Are U with me now? Good, press the OK button. SoftIce pops! Press F11. Now U see this: --------------- :00401C13 FF15C0634100 Call dword ptr [004163C0] :00401C19 68F0144100 push 004114F0 <-- U ARE HERE NOW!!! :00401C1E E80DC20000 call 0040DE30 :00401C23 83C404 add esp, 00000004 :00401C26 803DF614410000 cmp byte ptr [004114F6], 00 :00401C2D 7405 je 00401C34 :00401C2F BF01000000 mov edi, 00000001 :00401C34 803DF114410053 cmp byte ptr [004114F1], 53 :00401C3B 740E je 00401C4B :00401C3D 803DF114410035 cmp byte ptr [004114F1], 35 :00401C44 7405 je 00401C4B :00401C46 BF01000000 mov edi, 00000001 :00401C4B 803DF314410031 cmp byte ptr [004114F3], 31 :00401C52 7405 je 00401C59 :00401C54 BF01000000 mov edi, 00000001 :00401C59 803DF014410043 cmp byte ptr [004114F0], 43 :00401C60 7405 je 00401C67 :00401C62 BF01000000 mov edi, 00000001 :00401C67 803DF214410032 cmp byte ptr [004114F2], 32 :00401C6E 7405 je 00401C75 :00401C70 BF01000000 mov edi, 00000001 :00401C75 803DF414410039 cmp byte ptr [004114F4], 39 :00401C7C 7405 je 00401C83 :00401C7E BF01000000 mov edi, 00000001 :00401C83 6A00 push 00000000 :00401C85 85FF test edi, edi :00401C87 7419 je 00401CA2 :00401C89 681CF34000 push 0040F31C :00401C8E 6874F34000 push 0040F374 :00401C93 6A00 push 00000000 :00401C95 FF15E8634100 Call dword ptr [004163E8] :00401C9B 33C0 xor eax, eax :00401C9D 5F pop edi :00401C9E 5E pop esi :00401C9F C21000 ret 0010 --------------- Alot of code there, take it easy.... don't panic... I'll take it slowly! Now if U enter 'd 004114F0' U see the code we entered in the data window. Why 004114F0? Because there we are now it says 'PUSH 004114F0'! Press F10 until U come to this line: (00401C2D) :00401C26 803DF614410000 cmp byte ptr [004114F6], 00 :00401C2D 7405 je 00401C34 This is the first jump. If the code U entered is longer than 6 letters, then it DOESN'T JUMP, therefore it must be 6 or less. How did I found out that? K, remember that your code was at 004114F0? And at the line :00401C26 803DF614410000 cmp byte ptr [004114F6], 00 it checks if 004114F6 is 0. Get it? Your code starts at 004114F0. so here I'll show U: -------------------- 004114F0 = 6 004114F1 = 5 004114F2 = 6 004114F3 = 6 004114F4 = 5 004114F5 = 6 -------------------- Now 004114F6 is 0. Now it will jump.If u had typed one letter more, ex: 7,it would look like this: ------------------------------ 004114F0 = 6 004114F1 = 5 004114F2 = 6 004114F3 = 6 004114F4 = 5 004114F5 = 6 004114F6 = 7 ------------------------------------------------------------- Then 004114F6 is 7!!! Now it will NOT jump. Now U get it don't U! So just have 6 letters! K, lets continue! Press F10 until this line: (00401C3B) ---------------- :00401C34 803DF114410053 cmp byte ptr [004114F1], 53 :00401C3B 740E je 00401C4B It checks if 004114F1 is the hex value 53 and what that is, u can find out by entering '? 53' in SoftIce. Its S. And as u can see some lines ago, 004114F1 = 5. It checks if 5 is S!!! Now we're getting somewhere. So, now press 'x' and type in: 6S6656 as code. Press Ctrl+D, press F10 until this line: (00401C52) --------------------------- :00401C4B 803DF314410031 cmp byte ptr [004114F3], 31 :00401C52 7405 je 00401C59 Almost the same here, checks if 004114F3 is hex value 31. 004114F3 is now 6 and hex value 31 is 1! So, now press 'x' and type in: 6S6156 as code. Press Ctrl+D, press F10 until this line: (00401C60) --------------------------------------------------------- :00401C59 803DF014410043 cmp byte ptr [004114F0], 43 :00401C60 7405 je 00401C67 Almost the same here, checks if 004114F0 is hex value 43. 004114F0 is now 6 and hex value 43 is C! So, now press 'x' and type in: CS6156 as code. Press Ctrl+D, press F10 until this line: (00401C6E) --------------------------------------------------------- :00401C67 803DF214410032 cmp byte ptr [004114F2], 32 :00401C6E 7405 je 00401C75 Almost the same here, checks if 004114F2 is hex value 32. 004114F2 is now 6 and hex value 32 is 2! So, now press 'x' and type in: CS2156 as code. Now we're almost done! Press Ctrl+D, press F10 until this line: (00401C6E) ---------------- :00401C75 803DF414410039 cmp byte ptr [004114F4], 39 :00401C7C 7405 je 00401C83 Almost the same here, checks if 004114F4 is hex value 39. 004114F4 is now 5 and hex value 39 is 9! So, now press 'x' and type in: CS2196 as code. It worked!!! Congratulations!!! U cracked WinUGCS v3.0!!! But hey, it didn't check the last letter, 6? This letter can be whatever U want! It can also be forgotten, just enter CS219 as code, not enter the last 6. Ending Info: ************ This was a fine easy protection! I hope U didn't get lost back there! Just try, and try, till U get it right! You can meet me on EFNet in #Cracking4Newbies as Da_DiABLO and if you learned something from this tutorial, please tell me! And expect some more tutorials soon... Also visit my site: Http://DiABLO.Freehosting.Net/Index.htm Cya! Greeting: ********* Go to everybody in ORiON & Cracking4Newbies!! And also every other cracker that reads this tut!!! | |||||||||||||||||||||||||||||
·µ»Ø | |||||||||||||||||||||||||||||
%¡¾³õѧÌìµØ¡¿ | |||||||||||||||||||||||||||||
½âÃ̳ܽÌÆß ÉϽڿÎÓÉÓÚÎÒÔÚÐÞ¸Ä×Ô¼º¼ÒµÄ·¿×Ó£¬ËùÒÔûÓÐʱ¼ä¸ø´ó¼ÒÀ´ÉϿΣ¬Ï£Íû´ó¼Ò¶¼Á¹½â¡£½ñ ÌìÎÒÒªÏò´ó¼Ò½éÉÜʲôÄØ£¿ÎÒÏë¾ÍÏȲ»½éÉܾßÌåµÄ×·×Ù¹ý³ÌÁË¡£ÒòΪÕâ¸öÒÔºóÔÙ˵£¬ÎÒÏë ¶ÔÓÚ³õѧÕßÀ´Ëµ£¬ÏÖÔڹؼüµÄÊÇÈçºÎÆƽâÈí¼þ£¬Õâ¸ö¾ÍÊǾÑéµÄ»ýÀÛÁË¡£µ«ÊÇÎÒÏëͨ¹ýÎÒµÄ ¾ÑéÀ´Ïò´ó¼Ò½éÉÜһϽâÃܵķ½·¨¡£ÕâÑùÏ£ÍûÄãÃÇÄܹ»¸ü¿ìµÄ½øÈë½ÇÉ«ÖУ¬Õâ¸öÒ²¿ÉÊÇÎÒÒ» ÄêÀ´µÄÐÄѪ°¡¡£ ÒòΪÈç¹ûÄãÒªÏëÆƽâÈí¼þ£¬ÄÇôÄãÒÀ¾ÝʲôÀ´¾Í½«È˼ÒÖÆ×÷µÄÈí¼þÆƽâ³öÀ´ÁË¡£µ±È»Õâ Àï¸ø´ó¼Ò˵һÏ£¨Õæ¶Ô³õѧÕߵģ©£¬Äã¾ÍÒªÏë°ì·¨¿´µ½³ÌÐòµÄ×ßÏò£¬ÕâÑùÄã¾Í¿ÉÒÔÖªµÀ³ÌÐò ÊÇÈçºÎ¼ÆËãºÍÔËÐеģ¬ÕâÑùÄã¾Í¿ÉÒÔÆƽâÈí¼þÁË¡£ÄÇôÎÒÃÇÈçºÎ×·×ÙÄØ£¿ ½ñÌìÎÒ¾ÍÏò´ó¼Ò½éÉܼ¸ÖֱȽϳ£ÓõÄ×·×Ù·½·¨£¬ÏàÐÅ»á¶Ô´ó¼ÒÓÐÒ»¶¨µÄ°ïÖú¡£ 1 ÓÐ×¢²áÂëÊäÈëÄܹ»±»Ö±½ÓÀ¹ÏÂÀ´ ÕâÀïÊÇÖ¸ÓÐ×¢²áÂëÊäÈëµÄµØ·½£¬¶ø¿ÉÒÔʹÓÃÏàÓ¦µÄÀ¹½ØÄܹ»À¹Ïµġ£±ÈÈ磺ÊäÈënameºÍRN ºó£¬¿ÉÒÔʹÓà bpx hmemcpy bpx getdlgitemtextµÈ·½·¨À´À¹ÏÂÀ´£¬Èç¹ûÕâÑùµÄÀ¹ÏÂÀ´µÄ»° £¬¹Ø¼üÊÇÕÒµ½³ö´íµÄµØ·½£¬ÕâÑù¾Í¿ÉÒÔ²éÕÒ¿ÉÒԱܿª³ö´íµÄµØ·½£¬Í¨³£Ò²¾Í¿ÉÒÔÆƽâËüÁË¡£ 2 ÓÐ×¢²áÂëÊäÈë²»Äܹ»±»Ö±½ÓÀ¹ÏÂÀ´ Èç¹û²»Äܹ»±»À¹ÏÂÀ´£¬ÄÇô¿´Ò»¿´³ÌÐòÓÐÎÞÌáʾ´°¿Ú£¬Èç¹ûÓÐÊÇ×îºÃµÄ£¬Äã¿ÉÒÔʹÓÃbpx lockmytask ͨ³£Õâ¾Í¿ÉÒÔÀ¹ÏÂÀ´ÁËÈç¹ûûÓÐÌáʾ´°¿ÚµÄ£¬ÄÇôÔÚµã»÷×¢²áÇ°ÏÂÕâ¸öÃüÁî bp x sendmessage ͨ³£¿ÉÒÔ±»À¹ÏÂÀ´µÄ£¬»òÕßʹÓÿª´°º¯ÊýÈ磺bpx updatewindowÕâÑù³ÌÐòÔÚ ÕÒµ½´°¿ÚµÄʱºò¾Í¿ÉÒÔ±»À¹ÏÂÀ´ÁË¡£ 3 ÎÞ×¢²áÂëÊäÈëtime bombģʽ ÕâÖÖÇé¿öͨ³£Èí¼þʹÓõÄÊÇkeyÎļþ±£»¤µÄģʽ»òÕ߸ù±¾¾ÍÊÇÊÔÓð棬ËüÃǵÄÆƽâͨ³£ÊÇ Æƽâµôtime bomb¾Í¿ÉÒÔÁË¡£¶ÔÓÚ¸ßÊÖÀ´Ëµ£¬¿ÉÒÔÆƽâ³ökeyÎļþÖеÄÄÚÈÝÕâÑù¾ÍÄܹ»µÃµ½Íê ȫע²á°æÁË£¬µ«ÊǶÔÓÚ³õѧÕßÀ´Ëµ£¬ÕâÓеãÄѶȡ£ÄÇôÈçºÎÆƽâtime bombÄØ£¿¿ÉÒÔÏÂÕâÑù µÄÃüÁî bpx getsystemtime »òbpx settime bpx killtimeµÈÓëʱ¼äÏà¹ØµÄʱ¼äº¯Êý¡£ ÕâÖÖÇé¿ö±È½Ï¶à£¬»¹¿ÉÒÔʹÓùýÆÚ×¢²á·¨£¬°²×°ºóµ÷ºóÈÕÆÚ£¬½«Èí¼þ¹ýÆÚ£¬ÕâÑù¾Í¿ÉÒÔʹ ÓÃTRW»òSIÀ´µ÷Èë³ÌÐò´Ó¿ªÊ¼×·×ÙËü¡£²éÕÒµ½³ö´íµØ·½£¬ÔÙÕÒÌøÔ¾ÕâÀïµÄµØ·½¾Í¿ÉÒÔÁË¡£ 4 ÎÞ×¢²áÂëÊäÈëkeyģʽ ¶ÔÓÚÆƽâÕâÖÖÇé¿ö£¬Äã¿ÉÒÔ½èÖú¹¤¾ßÒ²¿ÉÒÔʹÓÃÖмÌÀ´Æƽ⣬Èç¹û½èÖú¹¤¾ßµÄ»°£¬Äã¿ÉÒÔʹ ÓÃfimemonÕâ¸öÎļþ¼àÊÓÆ÷£¬Ëü¿ÉÒÔ¿´µ½³ÌÐò¶¼¶ÔʲôÎļþ½øÐжÁдÁË£¬Èç¹û²»Ê¹Óù¤¾ßÄã¿É ÒÔÏÂbpx _lread bpx readfile bpx writefileµÈÃüÁÕâÑùÄã¾Í¿ÉÒÔ×·×Ùµ½ËüÃÇÁË¡£ 5 ÎÞ×¢²áÂëÊäÈë²¢¼Ó¿ÇÁË¡£ Õâ¸öÆƽâ¾Í±È½ÏÄÑÁË£¬ÒòΪÄãÎÞ·¨Í¨¹ýÐ޸ijÌÐòÀ´ÆƽâÈí¼þ£¬ÄÇôÆƽâËüÓÃʲô°ì·¨ÄØ£¿ ÕâÀï½éÉÜÁ½¸ö·½·¨£º £¨1£© ÔÚ°²×°Èí¼þʱµ÷ÓÃfilemonºÍregsapÈí¼þ£¬¼àÊÓ³ÌÐò½«Ê²Ã´¶«Î÷дµ½ÄãµÄÓ²ÅÌÉÏ£¬ ÕâÑù¾Í¿ÉÒÔÔÚ¹ýÆÚʱ£¬½«ËüÃÇͨͨɾ³ýµô£¬Èí¼þ¾ÍÈÏΪËüÊǸոհ²×°µÄ£¬ÓÖ¿ÉÒÔÔÙÔËÐÐÁË¡£ £¨2£©Ê¹ÓÃÊÖ¶¯»ò×Ô¶¯ÍÑ¿Ç£¬Èç¹ûÊÇÊÖ¶¯ÍѿǾÍÒªÇóÄã¶Ô¿Ç±È½ÏÁ˽âÁË¡£Õâ¸ö¾ÍÒª´ó¼ÒÀ´ ѧϰÁË¡£ÈçºÎÍÑ¿Ç£¬Õâ¸öÒ²ÓÐÒ»¶¨µÄ·½·¨£¬ÒÔºóÔÙ½éÉÜ°É¡£ ¿ÉÒÔʹÓÃprodumpÀ´ÍÑ¿Ç£¬ÔÚÍÑ¿Ç֮ǰʹÓÃÕì¿ÇÈí¼þÏȲéÒ»ÏÂÈí¼þʹÓÃʲôÀ´¼Ó¿ÇµÄ Õâ¸öºÜÖØÒª£¬Í¨³£Äܹ»¾ö¶¨ÄãÊÇ·ñ¿ÉÒÔÍѿdzɹ¦µÄ¡£ ºÃÁË£¬½ñÌì¾Í½éÉܵ½ÕâÀïÁË¡£ | |||||||||||||||||||||||||||||
·µ»Ø | |||||||||||||||||||||||||||||
O¡¾ÎÊÌâ´ðÒÉ¡¿ | |||||||||||||||||||||||||||||
һλÍøÓÑÌá³ö£ºÈçºÎÆƽâ¹ÉƱÕÊ»§¹ÜÀíÈí¼þ | |||||||||||||||||||||||||||||
ÏÂÔصØÖ·£ºhttp://go.163.com/~whsoft/SkActReg.exe | |||||||||||||||||||||||||||||
·µ»Ø | |||||||||||||||||||||||||||||
4¡¾ÍøÕ¾½éÉÜ¡¿ | |||||||||||||||||||||||||||||
°×²ËÀÖÔ°£ºhttp://202.102.230.155/secrecy/index.htm | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
·µ»Ø | |||||||||||||||||||||||||||||
,¡¾ÔÓÖ¾ÐÅÏä¡¿ | |||||||||||||||||||||||||||||
Ͷ¸åÐÅÏ䣺discoveredit@china.com | |||||||||||||||||||||||||||||
´ðÒÉÐÅÏ䣺discoveranswer@china.com | |||||||||||||||||||||||||||||
°ßÖñÐÅÏ䣺programhunter@china.com | |||||||||||||||||||||||||||||
·µ»Ø | |||||||||||||||||||||||||||||