http://ift.tt/2iwDRwK
前期准备
熟悉软件流程
好像也没有什么可以看的,目测也是很简单(当然要逆出算法还是需要花功夫的,暂时还是以爆破的方式逆吧)
软件流程:
PEID看一下
开干
没有特别的,直接上OD吧
对这种程序断API都嫌麻烦,还是直接搜索字符串吧,应该直接就能找到跳转
0040258B /74 58 JE SHORT Afkayas_.004025E5 ; 关键跳转
0040258D |68 801B4000 PUSH Afkayas_.00401B80 ; You Get It
00402592 |68 9C1B4000 PUSH Afkayas_.00401B9C ; \r\n
00402597 |FFD7 CALL EDI
00402599 |8BD0 MOV EDX,EAX
0040259B |8D4D E8 LEA ECX,DWORD PTR SS:[EBP-0x18]
0040259E |FFD3 CALL EBX
004025A0 |50 PUSH EAX
004025A1 |68 A81B4000 PUSH Afkayas_.00401BA8 ; KeyGen It Now
004025A6 |FFD7 CALL EDI
004025A8 |8D4D 94 LEA ECX,DWORD PTR SS:[EBP-0x6C]
004025AB |8945 CC MOV DWORD PTR SS:[EBP-0x34],EAX
004025AE |8D55 A4 LEA EDX,DWORD PTR SS:[EBP-0x5C]
004025B1 |51 PUSH ECX
004025B2 |8D45 B4 LEA EAX,DWORD PTR SS:[EBP-0x4C]
004025B5 |52 PUSH EDX
004025B6 |50 PUSH EAX
004025B7 |8D4D C4 LEA ECX,DWORD PTR SS:[EBP-0x3C]
004025BA |6A 00 PUSH 0x0
004025BC |51 PUSH ECX
004025BD |C745 C4 0800000>MOV DWORD PTR SS:[EBP-0x3C],0x8
004025C4 |FF15 10414000 CALL DWORD PTR DS:[<&MSVBVM50.#595>] ; Msvbvm50.rtcMsgBox
004025CA |8D4D E8 LEA ECX,DWORD PTR SS:[EBP-0x18]
004025CD |FF15 80414000 CALL DWORD PTR DS:[<&MSVBVM50.__vbaFreeS>; Msvbvm50.__vbaFreeStr
004025D3 |8D55 94 LEA EDX,DWORD PTR SS:[EBP-0x6C]
004025D6 |8D45 A4 LEA EAX,DWORD PTR SS:[EBP-0x5C]
004025D9 |52 PUSH EDX
004025DA |8D4D B4 LEA ECX,DWORD PTR SS:[EBP-0x4C]
004025DD |50 PUSH EAX
004025DE |8D55 C4 LEA EDX,DWORD PTR SS:[EBP-0x3C]
004025E1 |51 PUSH ECX
004025E2 |52 PUSH EDX
004025E3 |EB 56 JMP SHORT Afkayas_.0040263B
004025E5 \68 C81B4000 PUSH Afkayas_.00401BC8 ; You Get Wrong
004025EA 68 9C1B4000 PUSH Afkayas_.00401B9C ; \r\n
004025EF FFD7 CALL EDI
004025F1 8BD0 MOV EDX,EAX
004025F3 8D4D E8 LEA ECX,DWORD PTR SS:[EBP-0x18]
004025F6 FFD3 CALL EBX
004025F8 50 PUSH EAX
004025F9 68 E81B4000 PUSH Afkayas_.00401BE8 ; Try Again
004025FE FFD7 CALL EDI
果然,级别低的就是好找,直接就搜到了关键跳转
NOP掉
0040258B 90 NOP ; 关键跳转
0040258C 90 NOP
0040258D 68 801B4000 PUSH Afkayas_.00401B80 ; You Get It
00402592 68 9C1B4000 PUSH Afkayas_.00401B9C ; \r\n
00402597 FFD7 CALL EDI
运行一下试试吧,好像是没什么难度 ,有时间还是把算法逆出来吧
The post 160个Crack Me 之002 Afkayas.1 appeared first on cole.
http://ift.tt/2AxyX9y reverse engineering, reverse December 01, 2017 at 07:55PM
评论
发表评论