【破文标题】:环球卫星网络电视 V9.1 简单算法分析 + VB注册机

【破文作者】:KuNgBiM[DFCG]

【作者邮箱】:gb_1227@163.com

【软件名称】:环球电影电视剧 1.13

【保护方式】:注册码+功能限制

【编译语言】:Borland Delphi 6.0 - 7.0

【破解日期】:2005-06-23

【作者声明】:初学Crack,只是感兴趣,没有其他目的。失误之处敬请诸位大侠赐教!

—————————————————————————————————
【破解过程】:

侦测:用PEiD查壳,无壳,Borland Delphi 6.0 - 7.0 编译。

试探:运行主程序注册,输入试炼码,确认!程序提示:" 注册码无效。"

初步下药:使出法宝,用W32Dasm进行静态反汇编,查找" 注册码无效。"字符串,结果找到004CC880处,确定断点应下在004CC84B处。

对症下药:Ollydbg载入主程序,来到 004CC84B 处下断,F9运行,输入试炼信息:

***** 试炼信息 ******

机器码:BD258095
注册码:78787878

*********************

点击确定后OD断下:(这里我采用的是W32Dasm的反汇编信息,比较干净清楚!)

:004CC84B 8D55F0                  lea edxdword ptr [ebp-10]
:004CC84E 8B45FC                  mov eaxdword ptr [ebp-04]
:004CC851 8B8000030000            mov eaxdword ptr [eax+00000300]
:004CC857 E8BC67F7FF              call 00443018                         //取试炼码
:004CC85C 837DF000                cmp dword ptr [ebp-10], 00000000      //比较注册码是否为0
:004CC860 741E                    je 004CC880                           //等于0则跳死
:004CC862 8D55EC                  lea edxdword ptr [ebp-14]
:004CC865 8B45FC                  mov eaxdword ptr [ebp-04]           //向eax赋值1885C3C
:004CC868 8B8000030000            mov eaxdword ptr [eax+00000300]     //向eax赋值1887690
:004CC86E E8A567F7FF              call 00443018
:004CC873 8B45EC                  mov eaxdword ptr [ebp-14]           //试炼码赋值给eax
:004CC876 E8657BF3FF              call 004043E0
:004CC87B 83F808                  cmp eax, 00000008                     //试炼码长度是否为8
:004CC87E 7E30                    jle 004CC8B0                          //大于小于则不跳,继续走向下面的“深渊”!

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004CC860(C)
|

* Possible StringData Ref from Code Obj ->" 注册码无效。"
                                  |
:004CC880 B878CB4C00              mov eax, 004CCB78
:004CC885 E85E23F6FF              call 0042EBE8
:004CC88A 8B45FC                  mov eaxdword ptr [ebp-04]
:004CC88D 8B8000030000            mov eaxdword ptr [eax+00000300]
:004CC893 33D2                    xor edxedx
:004CC895 E8AE67F7FF              call 00443048
:004CC89A 8B45FC                  mov eaxdword ptr [ebp-04]
:004CC89D 8B8000030000            mov eaxdword ptr [eax+00000300]
:004CC8A3 8B10                    mov edxdword ptr [eax]
:004CC8A5 FF92C4000000            call dword ptr [edx+000000C4]
:004CC8AB E923020000              jmp 004CCAD3

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004CC87E(C)
|
:004CC8B0 8D45E4                  lea eaxdword ptr [ebp-1C]           //注册码位数等于8
:004CC8B3 50                      push eax
:004CC8B4 8D55E0                  lea edxdword ptr [ebp-20]
:004CC8B7 8B45FC                  mov eaxdword ptr [ebp-04]
:004CC8BA 8B8008030000            mov eaxdword ptr [eax+00000308]
:004CC8C0 E85367F7FF              call 00443018                         //取机器码
:004CC8C5 8B45E0                  mov eaxdword ptr [ebp-20]           //机器码入eax(ASCII "BD258095")
:004CC8C8 B906000000              mov ecx, 00000006                     //分配eax大小为6位
:004CC8CD BA01000000              mov edx, 00000001
:004CC8D2 E8697DF3FF              call 00404640                         //取机器码前6位
:004CC8D7 8B4DE4                  mov ecxdword ptr [ebp-1C]           //机器码前6位入ecx(ASCII "BD2580")
:004CC8DA 8D45E8                  lea eaxdword ptr [ebp-18]
:004CC8DD BA90CB4C00              mov edx, 004CCB90                     //规定edx为16进制数(ASCII "0x")
:004CC8E2 E8457BF3FF              call 0040442C
:004CC8E7 8B45E8                  mov eaxdword ptr [ebp-18]           //机器码前6位变为16进制数(ASCII "0xBD2580")
:004CC8EA E879C5F3FF              call 00408E68
:004CC8EF 8BF0                    mov esieax                          //将机器码前6位的字符串转换成16进制后存放在esi中
:004CC8F1 33C0                    xor eaxeax                          //异或清空
:004CC8F3 55                      push ebp
:004CC8F4 688ACA4C00              push 004CCA8A
:004CC8F9 64FF30                  push dword ptr fs:[eax]
:004CC8FC 648920                  mov dword ptr fs:[eax], esp
:004CC8FF 8D55DC                  lea edxdword ptr [ebp-24]
:004CC902 8B45FC                  mov eaxdword ptr [ebp-04]
:004CC905 8B8000030000            mov eaxdword ptr [eax+00000300]
:004CC90B E80867F7FF              call 00443018
:004CC910 8B45DC                  mov eaxdword ptr [ebp-24]           //假码赋值给EAX (ASCII "78787878")
:004CC913 E850C5F3FF              call 00408E68                         //将假码转为16进制
:004CC918 8BD8                    mov ebxeax                          //假码赋值给ebx (eax=04B23526,ebx=01887D84)
:004CC91A 8BC3                    mov eaxebx                          //ebx又赋值给eax(ebx=04B23526  eax=04B23526)
:004CC91C 2BC6                    sub eaxesi                          //eax=eax-esi   (esi=00BD2580,eax=04B23526)
:004CC91E 3B0550144E00            cmp eaxdword ptr [004E1450]         //比较eax与004E1450中的值是否相等(常量值=C0F1E)
:004CC924 7459                    je 004CC97F                           //EAX值若不等于C0F1E,就继续走向下面的“深渊”!
                                                                        //(C0F1E十进制数就是790302,/* 好象是作者生日*/)

* Possible StringData Ref from Code Obj ->" 你输入的注册码 "
                                  |
:004CC926 689CCB4C00              push 004CCB9C
:004CC92B 8D55D4                  lea edxdword ptr [ebp-2C]
:004CC92E 8B45FC                  mov eaxdword ptr [ebp-04]
:004CC931 8B8000030000            mov eaxdword ptr [eax+00000300]
:004CC937 E8DC66F7FF              call 00443018
:004CC93C FF75D4                  push [ebp-2C]

* Possible StringData Ref from Code Obj ->" 不正确。"
                                  |
:004CC93F 68B8CB4C00              push 004CCBB8
:004CC944 8D45D8                  lea eaxdword ptr [ebp-28]
:004CC947 BA03000000              mov edx, 00000003
:004CC94C E84F7BF3FF              call 004044A0
:004CC951 8B45D8                  mov eaxdword ptr [ebp-28]
:004CC954 E88F22F6FF              call 0042EBE8
:004CC959 8B45FC                  mov eaxdword ptr [ebp-04]
:004CC95C 8B8000030000            mov eaxdword ptr [eax+00000300]
:004CC962 33D2                    xor edxedx
:004CC964 E8DF66F7FF              call 00443048
:004CC969 8B45FC                  mov eaxdword ptr [ebp-04]
:004CC96C 8B8000030000            mov eaxdword ptr [eax+00000300]
:004CC972 8B10                    mov edxdword ptr [eax]
:004CC974 FF92C4000000            call dword ptr [edx+000000C4]
:004CC97A E901010000              jmp 004CCA80
.........
-------------------------------------------------------------------------------------------------------------------------
【算法总结】

注册验证非常简单:

注册码 = 十进制(机器码前6位+ C0F1E)

=======================
【VB6算法注册机源码】

Private Sub Text1_Change()
Dim jqm, z, a, b, m As String
x = Text1.Text
If x = "" Then           '未输入的机器码则不计算
Else
If Len(x) = 8 Then       '输入的机器码等于8位后才开始计算
a = "C0F1E"
z = Mid(x, 1, 6)
m = Format("&h" + z)
b = Format("&h" + a)
zcm = Val(m) + Val(b)
Text2.Text = zcm
End If
End If
End Sub

=======================

注册信息:

机器码:BD258095
注册码:13186206

--------------------------------------------------------------------------

(本文完)

版权所有(C)2005 KuNgBiM[DFCG]         Copyright (C) 2005 KuNgBiM[DFCG]


--------------------------------------------------------------------------
          Cracked BY KuNgBiM[DFCG]

                2005-06-23

                21:34:18 PM