ThornsLinks: https://www.zhihu.com/question/21678268/answer/160663342Source: KnowCopyright belongs to the author. Commercial reprint please contact the author for authorization, non-commercial reprint please specify the source.Find the following bunch of people, whatever examining, just advertise?Landlord problems in the key words:"open source"+ "to build online courses", on the "open source" this point, many of the answers are not reliable?In fact, the development of online education for so man
]} Access to the address in the topic, you can get a file, open after The file header is a lpck, do not know what format, but after seeing the MZ head. Delete all the parts before the MZ head, and successfully get an EXE. Requires input password. No way, just throw it into Ida ... find the key sections below: . text:00401363 mov [esp+5ch+var_5c], offset apassword; "Password:" . text:0040136a Call puts . text:0040136f Lea EAX, [esp+5ch+var_3e] . text:00401373 mov [esp+5ch+var_58], eax . text:00
replicates the system process information (Task[n]) and sets the necessary registers. * It also replicates data segments entirely. *///the replication process. Where the parameter nr is called Find_empty_process () assigns the task array item number. None is the return address that is pressed into the stack when called//sys_call_table in SYSTEM_CALL.S. intcopy_process (int nr, long ebp, long edi, long esi, long GS, long none, long ebx, long ecx, long edx
methods, here for the moment, the following is mainly to see how to locate these vtable.
.text:10002A52 mov edx, [ecx+4] .text:10002A55 mov eax, [ebp+ICorJitInfo] .text:10002A58 mov ecx, [eax+4] .text:10002A5B mov eax, [ecx+4] .text:10002A5E mov ecx, [ebp+ICorJitInfo] .text:10002A61 lea eax, [ecx+eax+4] .text:10002A65 mov ecx, [ebp+ICorJitInfo] .text:10002A68 mov edx, [ecx+
Image_import_descriptor structureIf there is a MessageBoxA function, the EAX contains the cell address (which holds the function entry); otherwise eax=0checkfunction procAssume Esi:ptr Image_import_descriptorMOV Edx,[esi]. Firstthunk to () the address of a cell (that holds a function entry)MOV Ebx,[esi]. OriginalfirstthunkAdd ebx,ecx ebx point to Image_thunk_data structure in memory blockCheck1:MOV EAX,[EBX]or Eax,eaxJZ Check3Add eax,ecx; eax point t
CPU provides a lot of registers, but in the process and function of Delphi, only EAX ECX EDX three registers are free to use;
If you change the other registers, restore them before the procedure and function are finished.
Remember the previous learning Delphi process and function The default calling convention is register, the first three parameters are passed through registers, and other parameters are stored and stack.
The three registers it refe
reaches 00401051, observe the function stack as follows:
We can see that the return address will be overwritten at the 13 offset of the TXT text.
Step 3:
(1) Compile the program code for the general pop-up calculator and extract the shellcode
# Include "stdio. h "int main () {unsigned int KerdllAddress; // defines the address unsigned int GetProcessAddr of kernel32; // defines the function address unsigned int loadlibrarya; unsigned int WinExecAddress; // The address of the command executio
[Article Title]: cracking of a CrackMe that requires a run trace[Author]: bxm[Author mailbox]: bxm78@163.com[Protection method]: name, serial[Language]: Borland C ++[Tools]: peid, od[Operating platform]: winxp[Author's statement]: I am only interested and have no other purpose. For errors, please enlighten us!--------------------------------------------------------------------------------[Detailed process]Use peid for Shell check, no shell, run, input name and serial, No prompts, load with OD, s
have any impact on the debugging program) after running, we press ALT + E or the E icon on the menu bar (this is to display the current module) after opening the program, we can select the process EXE of the program. Double-click 6
After double-clicking the program, I came to the Disassembly window and again looked for the ASCII character seek (after the program ran, the module checked the word seek to deal with the general shelling program very effective, you can try it yourself) this time we
, 2 stacks. Analysis Parameters:Move Ecx,14call 0069f7e0...mov Ebx,eax...mov eax,[ebx+98]mov ecx,008324e0push eaxpush 1FI thought that just using one of the above functions is enough, the front is initialized, and the result is--just add a nuke option, not ready, or countdown ...So the above a call 0069ccf0 is also necessary (altogether there are 4, one is the output debugging information, one is the above call 0069F7E0 get a parameter value, an increase option, not it is who? ), since the effec
pattern.8. Questions about how to track the program : Beginners often do not know how to follow the program when they start to learn how to track the code, how to find a place to compare the registry, when faced with a long heap of code when it seems overwhelmed. Usually the software inside the program using a subroutine (that is, call ********) to verify that we entered the correct registration code, for the registration code explicit existence of the program, generally will enter the registra
; End Aplib, data is solved in memory of 404120 applications004041c7 B9 FC070000 MOV ECX,7FC004041CC 8b1c08 MOV ebx,dword PTR DS:[EAX+ECX]004041CF 8999 00104000 MOV DWORD PTR ds:[ecx+401000],ebx004041d5 ^ E2 F5 loopd Short ahpack.004041cc; 404120 of the requested memory contains the extracted data, copy it to the Oep place004041d7-NOP; The following start to repair the IAT, hehe, 9090 will not be deliberately to a split it004041d8-NOP004041d9 BA 00004000 MOV
Software cracking-questions about how to track programs:
When beginners start to learn decryption, they often don't know how to track the program, how to find a place where the registration code is compared, and how to feel overwhelmed when facing a long pile of program code. Generally, software programs use a sub-program called CALL ********* to verify whether the entered registration code is correct or not. For programs with an explicit registration code, generally, the entered registration co
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.