目标:Beyond Compare 1.9f
下载:www.scootersoftware.com
简介:功能强大的文件比较工具,正是我要找的
原因:论坛上有人介绍,下载后发现要注册
程序出了2.0
beta版,看了一下,难度较大,blowfish大哥说1.9版比较好用,先用着先吧.此次破解比较简单,程序初运行出现提示框,选输入注册码按键,填入注册信息,下bpx
hmemcpy,查找后用bpm,调试过程中发现程序用了WritePrivateProfileStringA的函数,原来程序先将注册信息写入INI文件,再读出做运算,错误的话要求你重新输入.
在windows目录下发现beyond32.ini文件,打开后找到以下注册信息:
[Registration]
Version=1.9f
InstallCode=000091FD
Evaluation=0006A1EE
Name=Sam
Von
Organization=CCG
Registration #=67676767 <---假注册码
既然程序已将注册信息写入INI文件,于是用bpx getprivateprofilestringa来跟踪,在4AA479处程序已将以上信息读入内存,经过一段代码,程序用以上的版本号1.9f算出InstallCode和Evaluation,可能是安装时间和使用天数,这些不用理它,我们主要是找到算注册码的地方,下面是算法部分:
==Part I===========================================
之前的代码你会发现程序将我的注册名和组织名与字符串"Beyond Compare 1"连在一起变成"Beyond Compare 1Sam VonCCG",然后变成全大写.下面的代码将字串的每个字符做变形然后保存在原处,其中有3个分支,字符和数字分开处理,如果是空格就去掉.
0167:004A8CAF MOV EAX,[EBP-04] <---指向大写的字串
0167:004A8CB2 MOV BL,[EAX+ESI-01]<---第一位"B"
0167:004A8CB6 MOV EAX,EBX
0167:004A8CB8
ADD AL,BF
0167:004A8CBA SUB
AL,1A
0167:004A8CBC JNC 004A8CDA
<---判断字符or数字or空格
0167:004A8CBE LEA EAX,[EBP-04]
0167:004A8CC1 CALL 004040D0 <---不用进入
0167:004A8CC6 MOV EDX,[EBP-04]
0167:004A8CC9
XOR EDX,EDX
0167:004A8CCB MOV
DL,BL
0167:004A8CCD SUB EDX,BYTE +41
0167:004A8CD0
ADD EDX,BYTE +0A
0167:004A8CD3 MOV
[EAX+ESI-01],DL<---字符的处理
0167:004A8CD7 INC
ESI
0167:004A8CD8 JMP SHORT 004A8D0D
0167:004A8CDA
MOV EAX,[EBP-04]
0167:004A8CDD MOV
EAX,EBX
0167:004A8CDF ADD AL,D0
0167:004A8CE1
SUB AL,0A
0167:004A8CE3 JNC
004A8CFE <---判断数字or空格
0167:004A8CE5 LEA
EAX,[EBP-04]
0167:004A8CE8 CALL 004040D0
<---不用进入
0167:004A8CED MOV EDX,[EBP-04]
0167:004A8CF0 XOR EDX,EDX
0167:004A8CF2
MOV DL,BL
0167:004A8CF4 SUB
EDX,BYTE +30
0167:004A8CF7 MOV [EAX+ESI-01],DL<---数字的处理
0167:004A8CFB INC ESI
0167:004A8CFC
JMP SHORT 004A8D0D
0167:004A8CFE LEA
EAX,[EBP-04]
0167:004A8D01 MOV ECX,01
0167:004A8D06 MOV EDX,ESI
0167:004A8D08 CALL
00404148 <---去掉空格
0167:004A8D0D MOV
EAX,[EBP-04]
0167:004A8D10 CALL 00403F00
<---只是取原字串长度
0167:004A8D15 CMP
ESI,EAX
0167:004A8D17 JNG 004A8CAF
最后我们得到数据:0B 0E 22 18 17 0D 0C 18-16 19 0A 1B 0E 01 1C 0A 16 1F 18 17 0C
0C 10 (已去掉空格),于是bpm这个地址,找到以下代码:
==Part II========================================
0167:004A180C PUSH EBX
0167:004A180D PUSH
ESI
0167:004A180E PUSH EDI
0167:004A180F
MOV EBX,EDX
0167:004A1811 XOR
EDX,EDX
0167:004A1813 TEST CX,CX
0167:004A1816
JNA 004A1841
0167:004A1818 MOVZX ESI,DX
0167:004A181B MOVZX ESI,BYTE [EBX+ESI] <---数据第一位0B
0167:004A181F MOV EDI,EAX <---eax=0
0167:004A1821 SHR EDI,18
0167:004A1824 XOR
ESI,EDI
0167:004A1826 AND ESI,FF
<---保证esi为000000XX的形式
0167:004A182C MOV
ESI,[ESI*4+004B8A4C]<---查表得到一个数
0167:004A1833 SHL
EAX,08
0167:004A1836 XOR ESI,EAX
0167:004A1838
MOV EAX,ESI
0167:004A183A INC
EDX
0167:004A183B DEC ECX
0167:004A183C
TEST CX,CX <---循环完后eax=B8368083
0167:004A183F
JA 004A1818
0167:004A1841 POP
EDI
0167:004A1842 POP ESI
0167:004A1843
POP EBX
0167:004A1844 RET
看到程序的算法很简单,猜想eax的值就是注册码,退出后将eax转换成10进制,输入后提示错误,直接将它按字符形式输入,注册成功:-)
为了写注册机,我们必须得到程序数据表的内容,从4A182C处可以判断表长应为3F8位左右,dump下来,写出以下注册机.
==KeyGen===========================================
请将下面源程序保存为.rek文件,用注册机编写器编译,注册机编写器1.73测试通过!
.const
CharUpperBuffA PROTO :DWORD,:DWORD
.data
szHomePage
db "http://www.365hz.net",0
szEmail db "mailto:ljyljx@163.com",0
szErrMess db "输入的序列号不正确!",0
DATA dd 000000000h,05BD4B01Bh,0B3687D81h,0E8BCCD9Ah
dd 066D0FB02h,03D044B19h,0D5B88683h,08E6C3698h
dd 0CDA1F604h,09675461Fh,07EC98B85h,0251D3B9Eh
dd
0AB710D06h,0F0A5BD1Dh,018197087h,043CDC09Ch
dd 000000000h,05BD4B01Bh,0B3687D81h,0E8BCCD9Ah
dd 066D0FB02h,03D044B19h,0D5B88683h,08E6C3698h
dd 0CDA1F604h,09675461Fh,07EC98B85h,0251D3B9Eh
dd
0AB710D06h,0F0A5BD1Dh,018197087h,043CDC09Ch
dd 000000000h,05BD4B01Bh,0B3687D81h,0E8BCCD9Ah
dd 066D0FB02h,03D044B19h,0D5B88683h,08E6C3698h
dd 0CDA1F604h,09675461Fh,07EC98B85h,0251D3B9Eh
dd
0AB710D06h,0F0A5BD1Dh,018197087h,043CDC09Ch
dd 000000000h,05BD4B01Bh,0B3687D81h,0E8BCCD9Ah
dd 066D0FB02h,03D044B19h,0D5B88683h,08E6C3698h
dd 0CDA1F604h,09675461Fh,07EC98B85h,0251D3B9Eh
dd
0AB710D06h,0F0A5BD1Dh,018197087h,043CDC09Ch
dd 000000000h,05BD4B01Bh,0B3687D81h,0E8BCCD9Ah
dd 066D0FB02h,03D044B19h,0D5B88683h,08E6C3698h
dd 0CDA1F604h,09675461Fh,07EC98B85h,0251D3B9Eh
dd
0AB710D06h,0F0A5BD1Dh,018197087h,043CDC09Ch
dd 000000000h,05BD4B01Bh,0B3687D81h,0E8BCCD9Ah
dd 066D0FB02h,03D044B19h,0D5B88683h,08E6C3698h
dd 0CDA1F604h,09675461Fh,07EC98B85h,0251D3B9Eh
dd
0AB710D06h,0F0A5BD1Dh,018197087h,043CDC09Ch
dd 000000000h,05BD4B01Bh,0B3687D81h,0E8BCCD9Ah
dd 066D0FB02h,03D044B19h,0D5B88683h,08E6C3698h
dd 0CDA1F604h,09675461Fh,07EC98B85h,0251D3B9Eh
dd
0AB710D06h,0F0A5BD1Dh,018197087h,043CDC09Ch
dd 000000000h,05BD4B01Bh,0B3687D81h,0E8BCCD9Ah
dd 066D0FB02h,03D044B19h,0D5B88683h,08E6C3698h
dd 0CDA1F604h,09675461Fh,07EC98B85h,0251D3B9Eh
dd
0AB710D06h,0F0A5BD1Dh,018197087h,043CDC09Ch
dd 000000000h,05BD4B01Bh,0B3687D81h,0E8BCCD9Ah
dd 066D0FB02h,03D044B19h,0D5B88683h,08E6C3698h
dd 0CDA1F604h,09675461Fh,07EC98B85h,0251D3B9Eh
dd
0AB710D06h,0F0A5BD1Dh,018197087h,043CDC09Ch
dd 000000000h,05BD4B01Bh,0B3687D81h,0E8BCCD9Ah
dd 066D0FB02h,03D044B19h,0D5B88683h,08E6C3698h
dd 0CDA1F604h,09675461Fh,07EC98B85h,0251D3B9Eh
dd
0AB710D06h,0F0A5BD1Dh,018197087h,043CDC09Ch
dd 000000000h,05BD4B01Bh,0B3687D81h,0E8BCCD9Ah
dd 066D0FB02h,03D044B19h,0D5B88683h,08E6C3698h
dd 0CDA1F604h,09675461Fh,07EC98B85h,0251D3B9Eh
dd
0AB710D06h,0F0A5BD1Dh,018197087h,043CDC09Ch
dd 000000000h,05BD4B01Bh,0B3687D81h,0E8BCCD9Ah
dd 066D0FB02h,03D044B19h,0D5B88683h,08E6C3698h
dd 0CDA1F604h,09675461Fh,07EC98B85h,0251D3B9Eh
dd
0AB710D06h,0F0A5BD1Dh,018197087h,043CDC09Ch
dd 000000000h,05BD4B01Bh,0B3687D81h,0E8BCCD9Ah
dd 066D0FB02h,03D044B19h,0D5B88683h,08E6C3698h
dd 0CDA1F604h,09675461Fh,07EC98B85h,0251D3B9Eh
dd
0AB710D06h,0F0A5BD1Dh,018197087h,043CDC09Ch
dd 000000000h,05BD4B01Bh,0B3687D81h,0E8BCCD9Ah
dd 066D0FB02h,03D044B19h,0D5B88683h,08E6C3698h
dd 0CDA1F604h,09675461Fh,07EC98B85h,0251D3B9Eh
dd
0AB710D06h,0F0A5BD1Dh,018197087h,043CDC09Ch
dd 000000000h,05BD4B01Bh,0B3687D81h,0E8BCCD9Ah
dd 066D0FB02h,03D044B19h,0D5B88683h,08E6C3698h
dd 0CDA1F604h,09675461Fh,07EC98B85h,0251D3B9Eh
dd
0AB710D06h,0F0A5BD1Dh,018197087h,043CDC09Ch
dd 000000000h,05BD4B01Bh,0B3687D81h,0E8BCCD9Ah
dd 066D0FB02h,03D044B19h,0D5B88683h,08E6C3698h
dd 0CDA1F604h,09675461Fh,07EC98B85h,0251D3B9Eh
dd
0AB710D06h,0F0A5BD1Dh,018197087h,043CDC09Ch
szDATA db "BEYONDCOMPARE1"
db 50 dup(0)
szXor16 db "%lX",0
szOut
db 20 dup(0)
.code
lea edi,szDATA+14
mov eax,0
mov ecx,50
rep stosb
invoke lstrcat,addr szDATA,addr hInput1
invoke lstrcat,addr
szDATA,addr hInput2
invoke lstrlen,addr szDATA
push eax
invoke
CharUpperBuffA,addr szDATA,eax ;<--此段连接字串并转为大写
mov eax,20h
lea edi,szDATA
pop ecx
PRO1:
repnz scasb
jnz PRO2
mov esi,edi
push edi
dec edi
push ecx
rep movsb
mov [edi],byte
ptr 0
pop ecx
pop edi
jmp PRO1 ;<--此段去掉空格
PRO2:
invoke lstrlen,addr szDATA
mov edi,eax
mov esi,1
PRO5:
lea eax,szDATA
mov bl,[eax+esi-1]
mov ecx,ebx
add
cl,0BFh
sub cl,1Ah
jnc PRO3
xor edx,edx
mov dl,bl
sub
edx,byte ptr 41h
add edx,byte ptr 0Ah
mov [eax+esi-1],dl
inc esi
jmp PRO4
PRO3:
xor edx,edx
mov dl,bl
sub edx,byte
ptr 30h
mov [eax+esi-1],dl
inc esi
jmp PRO4
PRO4:
cmp esi,edi
jng PRO5 ;<--以上是Part I的算法
mov ecx,edi
mov ebx,eax
xor eax,eax
xor edx,edx
PRO6:
movzx esi,dx
movzx esi,byte ptr [ebx+esi]
mov edi,eax
shr
edi,18h
xor esi,edi
and esi,0FFh
mov esi,[esi*4+DATA]
shl
eax,08
xor esi,eax
mov eax,esi
inc edx
dec ecx
test cx,cx
ja PRO6 ;<--Part II算法
invoke wsprintf,addr
szOut,addr szXor16,eax
lea eax,szOut
-=End=-
_/_/_/
_/ _/_/_/
_/_/_/ _/_/
_/_/ _/ _/
_/ _/ _/
_/ _/
_/ _/ _/ _/
_/_/_/
_/_/_/ _/ _/ _/
Sam.com
6:19 2002-4-28