代理服务器 CCProxy v3.94破解过程
用TRW载入程序
下断点bpx 403137
:00403101 8D4C2410 lea
ecx, dword ptr [esp+10]
:00403105 E8A22A0200 call 00425BAC
:0040310A 8D8C24C4100000 lea ecx, dword ptr
[esp+000010C4]
:00403111 8D9424C4040000 lea edx, dword ptr
[esp+000004C4]
:00403118 51
push ecx
:00403119 8D8424C80C0000 lea eax, dword ptr
[esp+00000CC8]
:00403120 52
push edx
:00403121 50
push eax
:00403122 E889F3FFFF call 004024B0
:00403127 8D8C24D0080000 lea ecx, dword ptr
[esp+000008D0]
:0040312E 6A0C
push 0000000C
:00403130 8D9424D4100000 lea edx, dword ptr
[esp+000010D4]
:00403137 51
push ecx
-->d edx 可以看到序列号
:00403138 52
push edx
:00403139 E8E2040100 call 00413620
:0040313E 8B0D84C94300 mov ecx, dword
ptr [0043C984]
:00403144 83C418
add esp, 00000018
:00403147 A350C24300 mov dword
ptr [0043C250], eax
:0040314C 894C2414 mov
dword ptr [esp+14], ecx
:00403150 85C0
test eax, eax
:00403152 C68424CC14000005 mov byte ptr [esp+000014CC],
05
:0040315A 7415
je 00403171
* Possible Reference to String Resource ID=00128: "代理服务器 CCProxy v3.94 (5用户演示版)"
|
:0040315C 6880000000 push 00000080
:00403161 8D4C2418 lea
ecx, dword ptr [esp+18]
:00403165 E80C270200 call 00425876
:0040316A 8B542414 mov
edx, dword ptr [esp+14]
:0040316E 52
push edx
:0040316F EB10
jmp 00403181
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0040315A(C)
|
* Possible Reference to String Resource ID=00127: "代理服务器 CCProxy v3.94"
|
:00403171 6A7F
push 0000007F
:00403173 8D4C2418 lea
ecx, dword ptr [esp+18]
:00403177 E8FA260200 call 00425876
:0040317C 8B442414 mov
eax, dword ptr [esp+14]
:00403180 50
push eax
--------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------
在"关于"中注册输入刚才得到的序列号并下断点bpx 4047cf
* Possible StringData Ref from Data Obj ->"system"
|
:004047BC 6848C14300 push 0043C148
:004047C1 FFD3
call ebx
:004047C3 8BB620020000 mov esi, dword
ptr [esi+00000220]
:004047C9 6A0C
push 0000000C
:004047CB 8D442414 lea
eax, dword ptr [esp+14]
:004047CF 56
push esi
-->e eax 可以看到注册号
:004047D0 50
push eax
:004047D1 E84AEE0000 call 00413620
:004047D6 83C40C
add esp, 0000000C
:004047D9 85C0
test eax, eax
:004047DB 5F
pop edi
:004047DC 5E
pop esi
:004047DD 5B
pop ebx
* Possible Reference to Dialog: DialogID_0088, CONTROL_ID:00FF, ""
|
:004047DE 6AFF
push FFFFFFFF
:004047E0 6A40
push 00000040
:004047E2 750B
jne 004047EF
* Possible Reference to String Resource ID=00125: "注册成功"
|
:004047E4 6A7D
push 0000007D
:004047E6 E898520200 call 00429A83
:004047EB 33C0
xor eax, eax
:004047ED EB0C
jmp 004047FB
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004047E2(C)
|
* Possible Reference to String Resource ID=00126: "注册失败"
|
:004047EF 6A7E
push 0000007E
:004047F1 E88D520200 call 00429A83
:004047F6 B801000000 mov eax,
00000001
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004047ED(U)
|
:004047FB 8B0D84C94300 mov ecx, dword
ptr [0043C984]
:00404801 A350C24300 mov dword
ptr [0043C250], eax
:00404806 894C2400 mov
dword ptr [esp], ecx
:0040480A 85C0
test eax, eax
:0040480C C784240C04000000000000 mov dword ptr [esp+0000040C], 00000000
:00404817 7407
je 00404820
好注册成功了
如果要暴破把
:0040315A 7415
je 00403171 -->jmp 00403171
:004047E2 750B
jne 004047EF -->nop
nop
conanxu[BCG]
conanxu@eastday.com
- 标 题:5.1活动刚到家,打开电脑就破了“代理服务器 CCProxy v3.94”,内容如下 (4千字)
- 作 者:conanxu[BCG]
- 时 间:2001-5-4 17:10:5
- 链 接:http://bbs.pediy.com