From TerryKaramay blog
Recently, I got a set of network security detection software from a company. as shown in: The program uses dongle, so it cannot be used directly. double-click the program and the following prompt box will pop up: Since the dongle is encrypted, try to crack it. let's see how commercial software encryption measures are implemented? Let's take a look at it. :) Are you sure you want to shell the program? PEID is used for detection. The program is not shelled and can be directly decompiled to view code and resource information. then let's try out OD (OllyDbg. ctrl + F2 load software. right-click and choose "Super String reference". For example, you can find the position of the prompt information. Because the program is not shelled, the information is easily located. press enter to follow up the code. note that the message prompt starts to be called at 004063EF address. if you are careful, it is easy to find that there is a key jump to jnz short Scanner.004063EF at the address 004063B6. The original prompt message is from here. this is probably the key point! Regardless of the length of the JZ and JNZ machine codes, we will try to modify the code here by means of disassembly. (One is 74 and the other is 75. after modification, save the exe file and double-click the software. dizzy ...... it can run normally! The interface is as follows: Alas, this is not the case with commercial software encryption measures! Easy cracking...