Déjà vu
Baidu Cloud Disk Sharing tool is dedicated to automatically batch share Baidu cloud file software. Its principle is completely simulated in the Web page login Baidu cloud Disk, simulation manual Click, will share the "public link" or "Private link" saved, for query export, in order to improve work efficiency. The so-called "simulation" is the use of WebBrowser to operate, grab elements, submit validation and so on. I have done a lot of similar operations to bulk download, batch registration.
For some students, this volume sharing tool is very useful. But the author is a bit keyed, try to share only three per day (at least 10 bar)
not by the routine.
I began to try to find features, shell shelling, search key ...
But the author does not play by the routine, he puts the key method in another DLL and invokes it through reflection. and modify the main program, the key DLL cannot be called.
Well, I'll write a keygen to call your key DLL, or you can't call it! There must be something special in this process.
authorvery witty .
Summarize down, I to it, can not change, cannot adjust (Diao, own Write program tune), cannot tune (Tiao, use Dnspy), saw the author's article explained my idea.
He said that the use of conventional obfuscation, encryption, packers to achieve anti-call (direct and reflection), anti-compilation purposes, these can be cracked, but it is a matter of time. Instead of using the key code and authorization validation in the unmanaged heap code, the managed heap code provides an interface for external dynamic compilation calls, and, more to the unmanaged code, the use of the hash value industry to determine the authentication caller.
It can be seen that the author has a deep understanding of anti-compilation and strong protection consciousness of intellectual property. It's a good intention.
hundred dense one sparse
Sincerely admire the author's research on his works. Hundred dense a sparse, is the person has the flaw, is the procedure all has the loophole. According to the author's vulnerability (inconvenient to share) inversion deduced the implementation of the activation Code, and wrote a register machine.
Through the test, the successful registration, the function can also be used.
Do not manipulate any elements of the interface during the sharing process, otherwise the sharing may go wrong.
No longer have any restrictions, see the results after sharing, the heart of infinite Joy, although this software for me a little use!
learn from the author
Through this article, on the one hand is to share the problem that the crack process encounters, on the other hand, is expresses to the author's study mentality. The author's software is easy to operate and stable in function. Although simple words, but difficult to do, especially encountered a number of complicated procedures. In the actual development, it is necessary to do this, do it well, or do not do.
. NET hack Baidu Cloud disk sharing tool (batch)