|
![]() | 作者: jiekspil [jiekspil]
![]() |
登录 |
by Fpc/CCG&BCG @2001/12 tools: trw1.22 [info] 软件名称:The Cleaner 整理日期:2001.12.8 最新版本:3.2 Build 3213 文件大小:1833KB 软件授权:共享软件 使用平台:Win9x/Me/NT/2000 软件下载:hXtp://gt.onlinedown.net/down/cleaner3.exe 软件简介: 一个专门检测和清除侵入您系统中的特洛伊木马的专业程序, 内置3093个木马标识。可在线升级版本和病毒数据库, 操作简单, 功能强大! 查杀的各类特洛伊木马种类最多,几乎所有较出名的这里都有,如 Netspy、BO、Netbus、 Girlfriend、Happy99、BackDoor 以及它们的一些不同版本。还有很多种我们大多数网友听都没听过,有了它我们可以将电脑“清洁”得干干净净,放心大胆地上网。将毒数据库cleaner.cdb复制到The Cleaner的安装目录下,就可以完成升级了。 [protection] NAG, serial [level] 1.5/5 [essay] 好久没有什么破解了,找到这个软件,估计会有点用,下载后安装、运行。一个NAG跳出来:“你还有30天试用时间”*_*呵呵,还可以输入注册码。好了,用户名:Fpc/CCG&BCG,注册码:123654,点注册,@$%#$%#@!@%&,不正确。它首先检查注册码长度应该是19,还与两个黑名单比较。这些我们不关心,看它如何计算:其实注册名用不到,是对输入的注册码作一些转换和验证,如果通过即注册。 由delphi或bcb编译,UPX加的壳,懒得脱了~~注册信息好象是写在文件时,每次运行时检查。另外不清楚它有没有网上检验。 输入注册码后跟踪,很容易到这里: ... 017F:004933B2 MOV EAX,[004B50B0] 017F:004933B7 MOV EAX,[EAX] 017F:004933B9 CALL 004B043C <- 检验注册码,重要 017F:004933BE TEST AL,AL <- al==0表示注册失败 017F:004933C0 JZ 004933D9 017F:004933C2 MOV EAX,[EBX+01F4] 017F:004933C8 CALL 00492474 017F:004933CD MOV DWORD [EBX+0150],01 017F:004933D7 JMP SHORT 004933F9 <- 017F:004933D9 ADD BYTE [EBX+0200],01 017F:004933E0 JNC 004933E7 017F:004933E2 CALL 00402E5C 017F:004933E7 PUSH BYTE +30 017F:004933E9 CALL `USER32!MessageBeep` <- 呵呵,小喇叭响一声 017F:004933EE MOV EAX,[EBX+01F8] 017F:004933F4 CALL 00492B84 017F:004933F9 XOR EAX,EAX 017F:004933FB POP EDX 017F:004933FC POP ECX 017F:004933DA ADD DWORD [EAX],BYTE +02 017F:004933DD ADD [EAX],AL 017F:004933DF ADD [EBX+05],ESI 017F:004933E2 CALL 00402E5C 017F:004933E7 PUSH BYTE +30 017F:004933E9 CALL `USER32!MessageBeep` 017F:004933EE MOV EAX,[EBX+01F8] 017F:004933F4 CALL 00492B84 017F:004933F9 XOR EAX,EAX 017F:004933FB POP EDX 017F:004933FC POP ECX ... 显然得追进CALL 004B043: 017F:004B043C PUSH EBP 017F:004B043D MOV EBP,ESP 017F:004B043F ADD ESP,FFFFFDF0 017F:004B0445 PUSH EBX 017F:004B0446 PUSH ESI 017F:004B0447 PUSH EDI 017F:004B0448 XOR EDX,EDX 017F:004B044A MOV [EBP+FFFFFDF4],EDX 017F:004B0450 MOV [EBP+FFFFFDF0],EDX 017F:004B0456 MOV [EBP-04],EDX 017F:004B0459 MOV [EBP-08],EDX 017F:004B045C MOV EDI,EAX 017F:004B045E MOV ECX,08 017F:004B0463 LEA EAX,[EBP+FFFFFE08] 017F:004B0469 MOV EDX,[004010AC] 017F:004B046F CALL 004042A8 017F:004B0474 XOR EAX,EAX 017F:004B0476 PUSH EBP 017F:004B0477 PUSH DWORD 004B0801 017F:004B047C PUSH DWORD [FS:EAX] 017F:004B047F MOV [FS:EAX],ESP 017F:004B0482 XOR EAX,EAX 017F:004B0484 PUSH EBP 017F:004B0485 PUSH DWORD 004B07B4 017F:004B048A PUSH DWORD [FS:EAX] 017F:004B048D MOV [FS:EAX],ESP 017F:004B0490 MOV EDX,[EDI+534C] 017F:004B0496 LEA EAX,[EBP-04] 017F:004B0499 MOV ECX,004B081C 017F:004B049E CALL 00403D88 017F:004B04A3 LEA EAX,[EDI+0151B36C] 017F:004B04A9 MOV EDX,004B082C 017F:004B04AE CALL 00403B14 017F:004B04B3 LEA EAX,[EDI+0151B370] 017F:004B04B9 CALL 00403AC0 017F:004B04BE MOV EAX,[EBP-04] 017F:004B04C1 CALL 00407B4C <- 上面的许多call都不重要 017F:004B04C6 TEST AL,AL <- 这里不会跳走 017F:004B04C8 JZ NEAR 004B0788 017F:004B04CE MOV EDX,[EBP-04] 017F:004B04D1 LEA EAX,[EBP+FFFFFE28] 017F:004B04D7 CALL 00405222 经验: borland编译结果就是这个特征,你经常可见到: mov/lea eax, [SomeAddress] mov/lea edx, [SomeAddress] call SomeFuntion mov... eax, edx是重要的两个寄存器,根据它的 __fastcall 调用规则,函数参数首先是通过eax, edx, ecx(通常是记录字节个数),如果还有其它的参数,就会用到push压入堆栈。关于borland逆向工程,你最好有一些delphi/BCB的编程经验,DEDE可以提供丰富的反编译信息~~不算是作广告。动态跟踪时,多用这些命令:d eax, d edx, d *eax, d *edx, 通常的call不要追进去,因为就算跟进那个call你也看不明白,而遇到参数较多的call,极有可能是作者自己写的,需要追进,注册码的计算可能就在里面哦~ 017F:004B04DC LEA EAX,[EBP+FFFFFE28] 017F:004B04E2 CALL 00405527 017F:004B04E7 LEA EDX,[EDI+0151B36C] 017F:004B04ED LEA EAX,[EBP+FFFFFE28] 017F:004B04F3 CALL 004040F8 017F:004B04F8 LEA EAX,[EBP+FFFFFE28] 017F:004B04FE CALL 004054C4 017F:004B0503 LEA EDX,[EBP-08] 017F:004B0506 LEA EAX,[EBP+FFFFFE28] 017F:004B050C CALL 004040F8 017F:004B0511 LEA EAX,[EBP+FFFFFE28] 017F:004B0517 CALL 004054C4 017F:004B051C LEA EAX,[EBP+FFFFFE28] 017F:004B0522 CALL 00405328 017F:004B0527 LEA EAX,[EDI+0151B370] <- a buffer 017F:004B052D MOV EDX,[EBP-08] <- 输入的注册码,我用Irc来代替 017F:004B0530 CALL 00403B14 <- 复制字符串或复制一个字符串的指针 017F:004B0535 MOV EAX,[EBP-08] <- Irc 017F:004B0538 MOV EDX,004B084C <- 一个黑名单上的注册码 017F:004B053D CALL 00403E4C <- 比较 017F:004B0542 JZ 004B0553 <- 一致就去死 017F:004B0544 MOV EAX,[EBP-08] 017F:004B0547 MOV EDX,004B0868 017F:004B054C CALL 00403E4C <- 比较另一个黑名单 017F:004B0551 JNZ 004B057D <- 不在其上则继续 017F:004B0553 LEA EAX,[EDI+0151B36C] 017F:004B0559 MOV EDX,004B082C 017F:004B055E CALL 00403B14 017F:004B0563 LEA EAX,[EDI+0151B370] 017F:004B0569 CALL 00403AC0 017F:004B056E XOR EBX,EBX 017F:004B0570 XOR EAX,EAX 017F:004B0572 POP EDX 017F:004B0573 POP ECX 017F:004B0574 POP ECX 017F:004B0575 MOV [FS:EAX],EDX 017F:004B0578 JMP 004B07C0 017F:004B057D MOV EAX,[EBP-08] <- 好了,到这里 017F:004B0580 CALL 00403D3C <- eax=[eax-4],取Irc长度 017F:004B0585 CMP EAX,BYTE +13 017F:004B0588 JZ 004B05B4 <- 为19则继续 017F:004B058A LEA EAX,[EDI+0151B36C] <- 否则继续 017F:004B0590 MOV EDX,004B082C 017F:004B0595 CALL 00403B14 017F:004B059A LEA EAX,[EDI+0151B370] 017F:004B05A0 CALL 00403AC0 017F:004B05A5 XOR EBX,EBX 017F:004B05A7 XOR EAX,EAX 017F:004B05A9 POP EDX 017F:004B05AA POP ECX 017F:004B05AB POP ECX 017F:004B05AC MOV [FS:EAX],EDX 017F:004B05AF JMP 004B07C0 017F:004B05B4 MOV EAX,[EBP-08] <- 继续 017F:004B05B7 CALL 00403D3C 017F:004B05BC MOV ESI,EAX <- Irc长度保存到esi 017F:004B05BE TEST ESI,ESI 017F:004B05C0 JNG 004B05E4 <- 不会跳 017F:004B05C2 MOV EBX,01 <- ebx作为循环变量 017F:004B05C7 MOV EAX,[EBP-08] 017F:004B05CA CMP BYTE [EAX+EBX-01],2D <- Irc[i]=='-'? 017F:004B05CF JNZ 004B05E0 <- 不等比较下一个 017F:004B05D1 LEA EAX,[EBP-08] 017F:004B05D4 MOV ECX,01 017F:004B05D9 MOV EDX,EBX 017F:004B05DB CALL 00403F80 <- 这个call删除当前位置的字符('-'),位置由edx决定,个数由ecx决定 017F:004B05E0 INC EBX 017F:004B05E1 DEC ESI 017F:004B05E2 JNZ 004B05C7 <- 未完继续,此循环删除Irc中的'-',如果有的话 <- 下面这一段会按顺序取出Irc中的字符,每次取2字节,共8次 017F:004B05E4 LEA EAX,[EBP+FFFFFE08] 017F:004B05EA PUSH EAX <- eax是指向缓冲区的指针 017F:004B05EB MOV ECX,02 <- ecx=2 017F:004B05F0 MOV EDX,01 <- edx=1 017F:004B05F5 MOV EAX,[EBP-08] <- Irc 017F:004B05F8 CALL 00403F40 <- 取字符到缓冲区去,位置由edx决定,长度由ecx决定 017F:004B05FD LEA EAX,[EBP+FFFFFE0C] 017F:004B0603 PUSH EAX 017F:004B0604 MOV ECX,02 017F:004B0609 MOV EDX,03 017F:004B060E MOV EAX,[EBP-08] 017F:004B0611 CALL 00403F40 <- 017F:004B0616 LEA EAX,[EBP+FFFFFE10] 017F:004B061C PUSH EAX 017F:004B061D MOV ECX,02 017F:004B0622 MOV EDX,05 017F:004B0627 MOV EAX,[EBP-08] 017F:004B062A CALL 00403F40 017F:004B062F LEA EAX,[EBP+FFFFFE14] 017F:004B0635 PUSH EAX 017F:004B0636 MOV ECX,02 017F:004B063B MOV EDX,07 017F:004B0640 MOV EAX,[EBP-08] 017F:004B0643 CALL 00403F40 017F:004B0648 LEA EAX,[EBP+FFFFFE18] 017F:004B064E PUSH EAX 017F:004B064F MOV ECX,02 017F:004B0654 MOV EDX,09 017F:004B0659 MOV EAX,[EBP-08] 017F:004B065C CALL 00403F40 017F:004B0661 LEA EAX,[EBP+FFFFFE1C] 017F:004B0667 PUSH EAX 017F:004B0668 MOV ECX,02 017F:004B066D MOV EDX,0B 017F:004B0672 MOV EAX,[EBP-08] 017F:004B0675 CALL 00403F40 017F:004B067A LEA EAX,[EBP+FFFFFE20] 017F:004B0680 PUSH EAX 017F:004B0681 MOV ECX,02 017F:004B0686 MOV EDX,0D 017F:004B068B MOV EAX,[EBP-08] 017F:004B068E CALL 00403F40 017F:004B0693 LEA EAX,[EBP+FFFFFE24] 017F:004B0699 PUSH EAX 017F:004B069A MOV ECX,02 017F:004B069F MOV EDX,0F 017F:004B06A4 MOV EAX,[EBP-08] 017F:004B06A7 CALL 00403F40 <- 取字符到这里完成了 017F:004B06AC LEA EAX,[EBP-08] 017F:004B06AF CALL 00403AC0 <- 初始化 017F:004B06B4 PUSH EDI 017F:004B06B5 MOV ESI,004B087C <- 这里是 16 字节的0x0 017F:004B06BA LEA EDI,[EBP+FFFFFDF8] 017F:004B06C0 MOV ECX,04 017F:004B06C5 REP MOVSD <- 数组初始化 017F:004B06C7 POP EDI 017F:004B06C8 MOV EBX,08 017F:004B06CD LEA ESI,[EBP+FFFFFE08] <- esi初始化为指向Irc的前两个字节,见上面 017F:004B06D3 PUSH BYTE +0A 017F:004B06D5 LEA EAX,[EBP-0C] 017F:004B06D8 PUSH EAX <- 缓冲区 017F:004B06D9 MOV EAX,[ESI] <- eax指向Irc的两个字节 017F:004B06DB CALL 00403F00 017F:004B06E0 LEA ECX,[EBP+FFFFFDF8] 017F:004B06E6 MOV EDX,10 017F:004B06EB CALL 004B023C 017F:004B06F0 LEA EAX,[EBP+FFFFFDF0] 017F:004B06F6 LEA EDX,[EBP+FFFFFDF8] 017F:004B06FC MOV ECX,10 017F:004B0701 CALL 00403CEC 017F:004B0706 MOV EAX,[EBP+FFFFFDF0] 017F:004B070C CALL 00407904 <- 这几个call实现str->Hex, 结果在eax,即:假设这两字节是"FA",则eax=0xFA 017F:004B0711 MOV EDX,EAX 017F:004B0713 LEA EAX,[EBP+FFFFFDF4] <- 缓冲区 017F:004B0719 CALL 00403C64 <- 保存edx 017F:004B071E MOV EDX,[EBP+FFFFFDF4] 017F:004B0724 LEA EAX,[EBP-08] <- 目标位置 017F:004B0727 CALL 00403D44 <- strcat 017F:004B072C ADD ESI,BYTE +04 017F:004B072F DEC EBX 017F:004B0730 JNZ 004B06D3 到这里,Irc变成了Hex值,并保存在[ebp-8],称为IrcA。我输入的是:1236-5465-4123-1236,[ebp-8]=12 36 54 65 41 23 12 36 继续: 017F:004B0732 PUSH DWORD 8C33 <- 参数 017F:004B0737 LEA EAX,[EBP+FFFFFDF4] 017F:004B073D PUSH EAX <- 目标缓冲区,称为IrcB 017F:004B073E MOV ECX,3182 <- 参数 017F:004B0743 MOV EDX,03D5 <- 参数 017F:004B0748 MOV EAX,[EBP-08] <- IrcA 017F:004B074B CALL 00474658 <- (1)这里计算注册的关键,需要跟进去 017F:004B0750 MOV EDX,[EBP+FFFFFDF4] <- IrcB 017F:004B0756 LEA EAX,[EBP-08] 017F:004B0759 CALL 00403B58 <- 又是复制一个指针 017F:004B075E XOR EDX,EDX 017F:004B0760 MOV EAX,[EBP-08] <- eax指向一个转换后的8字节数据 017F:004B0763 CALL 0040797C <- (2)验证注册数据,追进 017F:004B0768 MOV [EBP-0C],EAX <- eax是错误值,否则相当于str->int 017F:004B076B CMP DWORD [EBP-0C],BYTE +00 017F:004B076F JZ 004B0780 <- jump to BAD CRAcker 017F:004B0771 MOV EAX,[EBP-0C] 017F:004B0774 MOV ECX,7A 017F:004B0779 CDQ 017F:004B077A IDIV ECX 017F:004B077C TEST EDX,EDX 017F:004B077E JZ 004B0784 <- 还需要能被122整除 017F:004B0780 XOR EBX,EBX <- BAD Guy 017F:004B0782 JMP SHORT 004B078A 017F:004B0784 MOV BL,01 <- Good Guy 017F:004B0786 JMP SHORT 004B078A 017F:004B0788 XOR EBX,EBX 017F:004B078A MOV EDX,EBX ... 不重要了 (1)先看 CALL 00474658: 017F:0047465E PUSH EBX 017F:0047465F PUSH ESI 017F:00474660 PUSH EDI 017F:00474661 XOR EBX,EBX <- 初始化 017F:00474663 MOV [EBP-0C],EBX <- [ebp-c]=0 017F:00474666 MOV [EBP-04],ECX <- [ebp-4]=0x3182 017F:00474669 MOV ESI,EDX <- esi=0x3D5 017F:0047466B MOV EDI,EAX <- [edi]=IrcA 017F:0047466D XOR EAX,EAX <- eax=0 017F:0047466F PUSH EBP 017F:00474670 PUSH DWORD 004746E6 017F:00474675 PUSH DWORD [FS:EAX] 017F:00474678 MOV [FS:EAX],ESP 017F:0047467B MOV EAX,[EBP+08] 017F:0047467E CALL 00403AC0 017F:00474683 MOV EAX,EDI 017F:00474685 CALL 00403D3C <- 取长度 017F:0047468A TEST AL,AL <- al=8 017F:0047468C JNA 004746D0 <- 不跳 017F:0047468E MOV [EBP-05],AL <- [ebp-5]=8 017F:00474691 MOV BL,01 <- bl=1,循环变量 017F:00474693 LEA EAX,[EBP-0C] <- 缓冲区 017F:00474696 XOR EDX,EDX 017F:00474698 MOV DL,BL 017F:0047469A MOV DL,[EDI+EDX-01] <- dl=IrcA[i] 017F:0047469E MOV ECX,ESI <- ecx=esi 017F:004746A0 SHR ECX,08 <- ecx>>=8 017F:004746A3 XOR DL,CL <- dl^=cl 017F:004746A5 CALL 00403C64 <- 保存edx到缓冲区 017F:004746AA MOV EDX,[EBP-0C] 017F:004746AD MOV EAX,[EBP+08] 017F:004746B0 CALL 00403D44 <- strcat 017F:004746B5 MOV EAX,[EBP+08] <- 无用的指令,可能是为对齐 017F:004746B8 XOR EAX,EAX 017F:004746BA MOV AL,BL 017F:004746BC MOVZX EAX,BYTE [EDI+EAX-01] <- eax=IrcA[i] 017F:004746C1 ADD ESI,EAX <- esi+=eax 017F:004746C3 IMUL ESI,[EBP-04] <- esi*=0x3182 017F:004746C7 ADD ESI,[EBP+0C] <- esi+=0x8C33 017F:004746CA INC EBX 017F:004746CB DEC BYTE [EBP-05] 017F:004746CE JNZ 00474693 <- 未完继续 ... 这一段可以描述为: int esi=0x3D5; char IrcA[8]="...."; char IrcB[8]; for(short i=0; i<8; i++) { IrcB[i]=IrcA[i]^(esi>>8&0xFF); esi+=IrcA[i]; esi*=0x3182; esi+=0x8C33; } (2)继续看CALL 0040797C: 017F:0040797C PUSH EBX 017F:0040797D PUSH ECX 017F:0040797E MOV EBX,EDX 017F:00407980 MOV EDX,ESP 017F:00407982 CALL 00402C40 <- trace into 017F:00407987 CMP DWORD [ESP],BYTE +00 017F:0040798B JZ 0040798F 017F:0040798D MOV EAX,EBX 017F:0040798F POP EDX 017F:00407990 POP EBX 017F:00407991 RET 简单起见,这段代码检查IrcB每个字符是否是数字,不是则失败,并将其转为int到eax,结果要小于0x0CCCCCCC: 017F:00402C40 PUSH EBX 017F:00402C41 PUSH ESI 017F:00402C42 PUSH EDI 017F:00402C43 MOV ESI,EAX 017F:00402C45 PUSH EAX 017F:00402C46 TEST EAX,EAX 017F:00402C48 JZ 00402C9B 017F:00402C4A XOR EAX,EAX 017F:00402C4C XOR EBX,EBX 017F:00402C4E MOV EDI,0CCCCCCC 017F:00402C53 MOV BL,[ESI] 017F:00402C55 INC ESI 017F:00402C56 CMP BL,20 017F:00402C59 JZ 00402C53 017F:00402C5B MOV CH,00 017F:00402C5D CMP BL,2D 017F:00402C60 JZ 00402CA7 017F:00402C62 CMP BL,2B 017F:00402C65 JZ 00402CA9 017F:00402C67 CMP BL,24 017F:00402C6A JZ 00402CAE 017F:00402C6C TEST BL,BL 017F:00402C6E JZ 00402CA2 <- 这里不能去 017F:00402C70 SUB BL,30 017F:00402C73 CMP BL,09 <- 是否为数字 017F:00402C76 JA 00402CA2 017F:00402C78 CMP EAX,EDI <- eax不能比edi大 017F:00402C7A JA 00402CA2 017F:00402C7C LEA EAX,[EAX+EAX*4] 017F:00402C7F ADD EAX,EAX 017F:00402C81 ADD EAX,EBX <- eax=eax*10+bl 017F:00402C83 MOV BL,[ESI] 017F:00402C85 INC ESI 017F:00402C86 TEST BL,BL 017F:00402C88 JNZ 00402C70 017F:00402C8A DEC CH 017F:00402C8C JZ 00402C9E 017F:00402C8E TEST EAX,EAX 017F:00402C90 JL 00402CA2 017F:00402C92 POP ECX 017F:00402C93 XOR ESI,ESI 017F:00402C95 MOV [EDX],ESI 017F:00402C97 POP EDI 017F:00402C98 POP ESI 017F:00402C99 POP EBX 017F:00402C9A RET 017F:00402C9B INC ESI 017F:00402C9C JMP SHORT 00402CA2 017F:00402C9E NEG EAX 017F:00402CA0 JNG 00402C92 017F:00402CA2 POP EBX 017F:00402CA3 SUB ESI,EBX 017F:00402CA5 JMP SHORT 00402C95 017F:00402CA7 INC CH 017F:00402CA9 MOV BL,[ESI] 017F:00402CAB INC ESI 017F:00402CAC JMP SHORT 00402C6C 017F:00402CAE MOV EDI,0FFFFFFF 017F:00402CB3 MOV BL,[ESI] 017F:00402CB5 INC ESI 017F:00402CB6 TEST BL,BL 017F:00402CB8 JZ 00402C9B 017F:00402CBA CMP BL,61 017F:00402CBD JC 00402CC2 017F:00402CBF SUB BL,20 017F:00402CC2 SUB BL,30 017F:00402CC5 CMP BL,09 017F:00402CC8 JNA 00402CD5 017F:00402CCA SUB BL,11 017F:00402CCD CMP BL,05 017F:00402CD0 JA 00402CA2 017F:00402CD2 ADD BL,0A 017F:00402CD5 CMP EAX,EDI 017F:00402CD7 JA 00402CA2 017F:00402CD9 SHL EAX,04 017F:00402CDC ADD EAX,EBX 017F:00402CDE MOV BL,[ESI] 017F:00402CE0 INC ESI 017F:00402CE1 TEST BL,BL 017F:00402CE3 JNZ 00402CBA 017F:00402CE5 JMP SHORT 00402C92 很明显,我们需要找一个数,能被122整除,比0x0CCCCCCC小,这个数作为IrcB,反推出IrcA,从而得到注册码。 随机找到一个数:95830268=0x5B640FC,则IrcB[8]="95830268",将上面的程序稍动一下: int esi=0x3D5; char IrcA[8]; char IrcB[8]="95830268"; for(short i=0; i<8; i++) { IrcA[i]=IrcB[i]^(esi>>8&0xFF); esi+=IrcA[i]; esi*=0x3182; esi+=0x8C33; } 运行后得到注册码,注册通过。 附: //注册机,BCB 5.0编译通过 //--------------------------------------------------------------------------- #include //--- head added #include #include #include //--- added stoped #pragma hdrstop //--------------------------------------------------------------------------- #pragma argsused int main(int argc, char* argv[]) { int Acc=0x3D5; unsigned int Nul=0; //多余的变量防止出现符号扩展 char buff[100]; unsigned char IrcA[9]; //需要定义为unsigned char IrcB[9]; cout<<"The Cleaner 3.2 Build 3213 KeyMaker"<<endl; cout<<"cracked by Fpc/CCG&BCG"<<endl<<endl; cout<<"InPut Your Name: "; cin>>buff; cout<< "Your Code is : "; randomize(); Nul=122*rand()%819600; sprintf(IrcB, "%08d", Nul); for(short i=0; i<8; i++) { Nul=0; IrcA[i]=IrcB[i]^((Acc>>8)&0xFF); Nul=IrcA[i]; Acc+=Nul; Acc*=0x3182; Acc+=0x8C33; sprintf(buff, "%02X", IrcA[i]); cout<<buff; if(i%2 && i!=7) cout<<'-'; } cout<<endl<<endl<<"any key to quit..."; getch(); return 0; } [End] 转自:http://person.longcity.net/home3/feeling/crack/mytutors/kclner32.htm |
地主 发表时间: 12/30 8:18 |
![]() | 回复: bellamy [bellamy] ![]() |
登录 |
不错不错! |
B1层 发表时间: 01/19 10:40 |
![]() | 回复: lubai [lubai] ![]() |
登录 |
食不大厌精,脍不厌细。 |
B2层 发表时间: 03/25 08:39 |
|
20CN网络安全小组版权所有
Copyright © 2000-2010 20CN Security Group. All Rights Reserved.
论坛程序编写:NetDemon
粤ICP备05087286号