Crackme -- Acid burn (first program), crackme -- acidburn

Source: Internet
Author: User

Crackme -- Acid burn (first program), crackme -- acidburn

Crackme: Acid burn.exe

Difficulty coefficient:★

Tool: Chinese version of Ollydbg (OD)

 

Run Acid burn.exe

 

First, open OD load Acid burn.exe and enter The wrong registration name and password. The serial is incorect! (Sorry, the serial number is incorrect !)

 

 

 

Open OD --> plug-in --> Chinese search engine --> Search ASCLL shortcut key ctrl + F search string Sorry, The serial is incorect! Location

 

 

Double-click to enter the CPU window. The address here is 0042FA63. Let's write down this place to facilitate next debugging (Ctrl + G jump to this location ).

 

 

Before 0042FA63, there was a jge jump command (jump if the value is greater than or equal to). If it jumps here, the prompt information is skipped.

We will jump to the next breakpoint (the breakpoint under F2) to check the execution status. Run the program (F9) and re-enter the false registration name and password to find that the program has been broken. We perform one-step debugging by pressing F7 to call 00406930.

Then it was found that it had fallen into a deep hole set by the program author.


Obviously, this is not a prompt we are looking for. We will find two strings Congratz on the same prompt !! (Congratulations !!) And Good job dude =) (pretty Good, buddy) it's obvious that this is the outlet point we're looking.


We found Congratz !! In the previous jnz (not equal to ZF = 0), the jump will jump to 0042FBEF if the jump is successful. Here is the key hop we are looking ~ Before this command, a call must be the key call. We use the shortcut key Alt + B to open the breakpoint window and delete the previous breakpoint. Back to CPU window (Alt + C)

Next breakpoint tracking debugging before call (Ctrl + F2 re-start -- run)

At this time, the EAX value is CW-8856-CRACKED EDX value is our false password 11111111111111111111111

Here we suspect that the CW-8856-CRACKED is the registration code we are looking for. Let's go into this call and see.



Here we can see that

Mov esi, eax

Mov edi, edx

Cmp eax, edx

Je 00403A9A

Compare it with values in eax and edx. If the values are the same, jump here and we will analyze that the password is indeed a CW-8856-CRACKED.


 


Brute-force cracking: we must start with jnz to achieve brute-force cracking. Let ZF = 1 jnz not jump. We modify cmp eax, edx

For cmp eax and eax.


 



 

 

 

 

 

 


Starburn3266dll which program does this file belong?

You can delete a module of the recording software from the file name.

: Flash Optimizer 145 registration code

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.