鸟爆破Windows优化大师!
/ns/hk/crack/data/20040216102529.htm
					
软件名称:Windows优化大师  
版本:5.8.4.0112  
未注册限制:功能限制  
保护方法:注册名+机器码+注册码(据说用的是RSA算法,偶是爆破,才不管那么多呢!)  
偶原来用了娃娃的算法注册机,所以首先删掉注册表HKEY_LOCAL_MACHINE\SOFTWARE\Wom中的注册信息。  
用PEiD检测其主程序是ASPack压缩的,用ASPackDie脱掉,再检测发现是Delphi写的。  
1.主程序 
代码: 
用 W32Dasm 反汇编,点参考-串式参考,双击“Windows优化大师 V5.8 (已注册)”,来到软件启动时检测注册码的地方: 
* Referenced by a (U)nconditional or (C)onditional Jump at Address: 
|:00565BB0(C) 
| 
:00565BDE 8B45FC                  mov eax, dword ptr [ebp-04] 
:00565BE1 E87639FEFF              call 0054955C  <=关键CALL 
:00565BE6 85C0                    test eax, eax  <=比较 
:00565BE8 0F858F000000            jne 00565C7D   <=关键跳转,未注册的话就跳到00565C7D 
:00565BEE 8B45FC                  mov eax, dword ptr [ebp-04] 
:00565BF1 8B8020050000            mov eax, dword ptr [eax+00000520] 
* Possible StringData Ref from Code Obj ->"Windows优化大师 V5.8 (已注册)" 
                                  | 
:00565BF7 BA007C5600              mov edx, 00567C00 
:00565BFC E88B42F0FF              call 00469E8C 
:00565C01 8B45FC                  mov eax, dword ptr [ebp-04] 
:00565C04 8B8090030000            mov eax, dword ptr [eax+00000390] 
* Possible StringData Ref from Code Obj ->"网上升级" 
                                  | 
:00565C0A BA287C5600              mov edx, 00567C28 
:00565C0F E87842F0FF              call 00469E8C 
:00565C14 B201                    mov dl, 01 
:00565C16 A1A8D34300              mov eax, dword ptr [0043D3A8] 
:00565C1B E88878EDFF              call 0043D4A8 
:00565C20 8BD8                    mov ebx, eax 
:00565C22 BA02000080              mov edx, 80000002 
:00565C27 8BC3                    mov eax, ebx 
:00565C29 E81A79EDFF              call 0043D548 
:00565C2E 33C9                    xor ecx, ecx 
…………………………省略一些无关代码………………………… 
* Referenced by a (U)nconditional or (C)onditional Jump at Address: 
|:00565BE8(C) 
| 
:00565C7D 8B45FC                  mov eax, dword ptr [ebp-04] 
:00565C80 8B8020050000            mov eax, dword ptr [eax+00000520] 
* Possible StringData Ref from Code Obj ->"Windows优化大师 V5.8 (未注册)" 
                                  | 
:00565C86 BA887C5600              mov edx, 00567C88 
:00565C8B E8FC41F0FF              call 00469E8C 
:00565C90 8B45FC                  mov eax, dword ptr [ebp-04] 
:00565C93 8B8090030000            mov eax, dword ptr [eax+00000390] 
* Possible StringData Ref from Code Obj ->"软件注册" 
                                  | 
:00565C99 BAB07C5600              mov edx, 00567CB0 
:00565C9E E8E941F0FF              call 00469E8C 
:00565CA3 B201                    mov dl, 01 
:00565CA5 A1A8D34300              mov eax, dword ptr [0043D3A8] 
:00565CAA E8F977EDFF              call 0043D4A8 
:00565CAF 8BD8                    mov ebx, eax 
:00565CB1 BA02000080              mov edx, 80000002 
:00565CB6 8BC3                    mov eax, ebx 
:00565CB8 E88B78EDFF              call 0043D548 
:00565CBD B101                    mov cl, 01 
总结:将00565BE8处由jne 00565C7D改为NOP,即将偏移165BE8处由0F858F000000改为909090909090 
2.Windows系统医生 
代码: 
脱壳后用C32asm反汇编,点查看-字符串。 
方法1:该软件未注册限制只是不能修复全部错误,那么找到“说明:Windows系统医生的“全部修复”是提供给注册用户使用的功能,未注册用户只能手动逐项进行修复。” 
下面只有一项,双击来到这里: 
::004863CB::  64:FF30                  PUSH    DWORD PTR FS:[EAX]               
::004863CE::  64:8920                  MOV     DWORD PTR FS:[EAX], ESP          
::004863D1::  8B83 04040000            MOV     EAX, DWORD PTR [EBX+404]         
::004863D7::  BA 60694800              MOV     EDX, 486960                         \->: 已注册 
::004863DC::  E8 8FE0F7FF              CALL    00404470                        \:JMPUP 
::004863E1::  75 1D                    JNZ     SHORT 00486400        \:JMPDOWN <=关键一跳,呵呵,改为JMP 
::004863E3::  6A 40                    PUSH    40                               
::004863E5::  B9 68694800              MOV     ECX, 486968                         \->: Windows系统医生 
::004863EA::  BA 78694800              MOV     EDX, 486978               \->: 说明:Windows系统医生的“全部修复”是提供给注册用户使用的功能,未注册用户只能手动逐项进行修复。 
::004863EF::  A1 F0934800              MOV     EAX, DWORD PTR [4893F0]          
::004863F4::  8B00                     MOV     EAX, DWORD PTR [EAX]             
::004863F6::  E8 8136FFFF              CALL    00479A7C                        \:JMPUP 
::004863FB::  E9 22050000              JMP     00486922                        \:JMPDOWN 
::00486400::  8B83 B0030000            MOV     EAX, DWORD PTR [EBX+3B0]        \:BYJMP JmpBy:004863E1, 
::00486406::  8078 38 01               CMP     BYTE PTR [EAX+38], 1            \:BYJMP JmpBy:004863A5, 
::0048640A::  75 24                    JNZ     SHORT 00486430                  \:JMPDOWN 
::0048640C::  6A 21                    PUSH    21                               
::0048640E::  B9 68694800              MOV     ECX, 486968                         \->: Windows系统医生 
::00486413::  BA D8694800              MOV     EDX, 4869D8               \->: Windows系统医生建议在全部删除前进行注册表备份。单击“确认”将注册表备份为文件,如果不需要备份,请单击“取消”。 
方法2:找“已注册”,发现有3项,双击第一项,来到这里: 
::00485162::  33C9                     XOR     ECX, ECX                         
::00485164::  BA D4524800              MOV     EDX, 4852D4               \->: Software\Wom <=从注册表读取注册信息 
::00485169::  8BC3                     MOV     EAX, EBX                         
::0048516B::  E8 6CE0FAFF              CALL    004331DC                        \:JMPUP 
::00485170::  84C0                     TEST    AL, AL                           
::00485172::  74 2B                    JE      SHORT 0048519F                  \:JMPDOWN 
::00485174::  BA EC524800              MOV     EDX, 4852EC                         \->: Masters 
::00485179::  8BC3                     MOV     EAX, EBX                         
::0048517B::  E8 80E7FAFF              CALL    00433900                        \:JMPUP 
::00485180::  84C0                     TEST    AL, AL                           
::00485182::  74 12                    JE      SHORT 00485196        \:JMPDOWN <=多么经典的比较啊,当然改成JMP了 
::00485184::  8B45 FC                  MOV     EAX, DWORD PTR [EBP-4]           
::00485187::  05 04040000              ADD     EAX, 404                         
::0048518C::  BA FC524800              MOV     EDX, 4852FC                         \->: 已注册 
::00485191::  E8 22EFF7FF              CALL    004040B8                        \:JMPUP 
::00485196::  8BC3                     MOV     EAX, EBX                        \:BYJMP JmpBy:00485182, 
::00485198::  E8 A7DFFAFF              CALL    00433144                        \:JMPUP 
::0048519D::  EB 12                    JMP     SHORT 004851B1                  \:JMPDOWN 
::0048519F::  8B45 FC                  MOV     EAX, DWORD PTR [EBP-4]          \:BYJMP JmpBy:00485172, 
::004851A2::  05 04040000              ADD     EAX, 404                         
::004851A7::  BA FC524800              MOV     EDX, 4852FC                         \->: 已注册 
总结:偏移85182处74->EB 或偏移863E1处75->EB 
=========================
文章类型:转载 提交:沙加II 核查:NetDemon