夜深了还在写破文~~,没办法,谁叫我是菜鸟呢,呵呵!不过这次偷点懒,写简单一点,既然是破文,就一定得破到底~~~~~!!!!
破解工具:Ollydbg、W32dsm、系统自带计算器
破解目标:bos3.exe看雪联盟群共享里可下载!
跟踪过程就不做过多注释了,这里进那里出的,会让人看得头痛。呵呵~~~~
OD加载,在0046c729处下蛋~~~,具体的你就慢慢去跟吧~~~
列出几个关键call:
0046C729 . E8 02F6FFFF call bos3.0046BD30
0046BD6F |. E8 0483F9FF call bos3.00404078
00408483 |. E8 D4A8FFFF call bos3.00402D5C
0046C76B . E8 147DF9FF call bos3.00404484
断在此处:
:0046C729 E802F6FFFF call 0046BD30 //进去看看
:0046C72E 8B55DC mov edx, dword ptr [ebp-24]
:0046C731 8D45F0 lea eax, dword ptr [ebp-10]
:0046C734 E8D779F9FF call 00404110
:0046C739 8D45E4 lea eax, dword ptr [ebp-1C]
:0046C73C 50 push eax
:0046C73D 8B45F0 mov eax, dword ptr [ebp-10]
:0046C740 E8F37BF9FF call 00404338
:0046C745 8BD0 mov edx, eax
:0046C747 83EA03 sub edx, 00000003
:0046C74A 42 inc edx
:0046C74B B903000000 mov ecx, 00000003
:0046C750 8B45F0 mov eax, dword ptr [ebp-10]
:0046C753 E8407EF9FF call 00404598
:0046C758 8D55D4 lea edx, dword ptr [ebp-2C]
:0046C75B 8B45E4 mov eax, dword ptr [ebp-1C]
:0046C75E E8D9BAF9FF call 0040823C
:0046C763 8B45D4 mov eax, dword ptr [ebp-2C]
* Possible StringData Ref from Code Obj ->"zzh"
|
:0046C766 BA38CA4600 mov edx, 0046CA38
:0046C76B E8147DF9FF call 00404484 //跟进去
:0046C770 0F8599010000 jne 0046C90F //跳就over,爆破点 85->84
:0046C776 8D45E8 lea eax, dword ptr [ebp-18]
:0046C779 50 push eax
:0046C77A 8B45F0 mov eax, dword ptr [ebp-10]
:0046C77D E8B67BF9FF call 00404338
:0046C782 8BC8 mov ecx, eax
:0046C784 83E903 sub ecx, 00000003
:0046C787 BA01000000 mov edx, 00000001
:0046C78C 8B45F0 mov eax, dword ptr [ebp-10]
:0046C78F E8047EF9FF call 00404598
:0046C794 8D55CC lea edx, dword ptr [ebp-34]
:0046C797 8B45FC mov eax, dword ptr [ebp-04]
:0046C79A 8B8020030000 mov eax, dword ptr [eax+00000320]
:0046C7A0 E8237AFDFF call 004441C8
:0046C7A5 8B45CC mov eax, dword ptr [ebp-34]
:0046C7A8 8D55D0 lea edx, dword ptr [ebp-30]
:0046C7AB E88CBAF9FF call 0040823C
:0046C7B0 8B45D0 mov eax, dword ptr [ebp-30]
:0046C7B3 8D4DEC lea ecx, dword ptr [ebp-14]
* Possible StringData Ref from Code Obj ->"bosSoft"
|
:0046C7B6 BA28CA4600 mov edx, 0046CA28
:0046C7BB E870F5FFFF call 0046BD30
:0046C7C0 8D55C8 lea edx, dword ptr [ebp-38]
:0046C7C3 8B45EC mov eax, dword ptr [ebp-14]
:0046C7C6 E871BAF9FF call 0040823C
:0046C7CB 8B45C8 mov eax, dword ptr [ebp-38]
:0046C7CE 50 push eax
:0046C7CF 8D55C4 lea edx, dword ptr [ebp-3C]
:0046C7D2 8B45F8 mov eax, dword ptr [ebp-08]
:0046C7D5 E862BAF9FF call 0040823C
:0046C7DA 8B55C4 mov edx, dword ptr [ebp-3C]
:0046C7DD 58 pop eax
:0046C7DE E8A17CF9FF call 00404484
:0046C7E3 7476 je 0046C85B
:0046C7E5 8D55C0 lea edx, dword ptr [ebp-40]
:0046C7E8 8B45E8 mov eax, dword ptr [ebp-18]
:0046C7EB E84CBAF9FF call 0040823C
:0046C7F0 8B45C0 mov eax, dword ptr [ebp-40]
:0046C7F3 50 push eax
:0046C7F4 8D55BC lea edx, dword ptr [ebp-44]
:0046C7F7 8B45F4 mov eax, dword ptr [ebp-0C]
:0046C7FA E83DBAF9FF call 0040823C
:0046C7FF 8B55BC mov edx, dword ptr [ebp-44]
:0046C802 58 pop eax
:0046C803 E87C7CF9FF call 00404484
:0046C808 7451 je 0046C85B
:0046C80A 8D55B8 lea edx, dword ptr [ebp-48]
:0046C80D 8B45EC mov eax, dword ptr [ebp-14]
:0046C810 E827BAF9FF call 0040823C
:0046C815 8B45B8 mov eax, dword ptr [ebp-48]
:0046C818 50 push eax
:0046C819 8D55B4 lea edx, dword ptr [ebp-4C]
:0046C81C 8B45F8 mov eax, dword ptr [ebp-08]
:0046C81F E818BAF9FF call 0040823C
:0046C824 8B55B4 mov edx, dword ptr [ebp-4C]
:0046C827 58 pop eax
:0046C828 E8577CF9FF call 00404484
:0046C82D 8D55B0 lea edx, dword ptr [ebp-50]
:0046C830 8B45E8 mov eax, dword ptr [ebp-18]
:0046C833 E804BAF9FF call 0040823C
:0046C838 8B45B0 mov eax, dword ptr [ebp-50]
:0046C83B 50 push eax
:0046C83C 8D55AC lea edx, dword ptr [ebp-54]
:0046C83F 8B45F4 mov eax, dword ptr [ebp-0C]
:0046C842 E8F5B9F9FF call 0040823C
:0046C847 8B55AC mov edx, dword ptr [ebp-54]
:0046C84A 58 pop eax
:0046C84B E8347CF9FF call 00404484
:0046C850 0F85B9000000 jne 0046C90F //跳就over,爆破点 85->84
:0046C856 E9B4000000 jmp 0046C90F //跳就over,爆破点 E9B4000000->9090909090
* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:0046C7E3(C), :0046C808(C)
|
:0046C85B 8B45FC mov eax, dword ptr [ebp-04]
:0046C85E 8B8018030000 mov eax, dword ptr [eax+00000318]
* Possible StringData Ref from Code Obj ->"============你是高手,成功啦!============"
|
:0046C864 BA44CA4600 mov edx, 0046CA44
=======================================================================
call bos3.0046BD30 计算
0046BD30 /$ 55 push ebp
0046BD31 |. 8BEC mov ebp,esp
0046BD33 |. 83C4 D8 add esp,-28
0046BD36 |. 53 push ebx
0046BD37 |. 56 push esi
0046BD38 |. 57 push edi
0046BD39 |. 33DB xor ebx,ebx
0046BD3B |. 895D D8 mov dword ptr ss:[ebp-28],ebx
0046BD3E |. 895D F0 mov dword ptr ss:[ebp-10],ebx
0046BD41 |. 895D EC mov dword ptr ss:[ebp-14],ebx
0046BD44 |. 895D E8 mov dword ptr ss:[ebp-18],ebx
0046BD47 |. 8BF9 mov edi,ecx
0046BD49 |. 8955 F8 mov dword ptr ss:[ebp-8],edx
0046BD4C |. 8945 FC mov dword ptr ss:[ebp-4],eax
0046BD4F |. 8B45 FC mov eax,dword ptr ss:[ebp-4]
0046BD52 |. E8 D187F9FF call bos3.00404528
0046BD57 |. 8B45 F8 mov eax,dword ptr ss:[ebp-8]
0046BD5A |. E8 C987F9FF call bos3.00404528
0046BD5F |. 33C0 xor eax,eax
0046BD61 |. 55 push ebp
0046BD62 |. 68 41BE4600 push bos3.0046BE41
0046BD67 |. 64:FF30 push dword ptr fs:[eax]
0046BD6A |. 64:8920 mov dword ptr fs:[eax],esp
0046BD6D |. 8BC7 mov eax,edi
0046BD6F |. E8 0483F9FF call bos3.00404078
0046BD74 |. 8D45 F0 lea eax,dword ptr ss:[ebp-10]
0046BD77 |. 8B55 FC mov edx,dword ptr ss:[ebp-4]
0046BD7A |. E8 9183F9FF call bos3.00404110
0046BD7F |. 8D45 EC lea eax,dword ptr ss:[ebp-14]
0046BD82 |. 8B55 F8 mov edx,dword ptr ss:[ebp-8]
0046BD85 |. E8 8683F9FF call bos3.00404110
0046BD8A |. 8B45 F0 mov eax,dword ptr ss:[ebp-10]
0046BD8D |. E8 A685F9FF call bos3.00404338
0046BD92 |. B9 03000000 mov ecx,3
0046BD97 |. 99 cdq
0046BD98 |. F7F9 idiv ecx
0046BD9A |. BB 01000000 mov ebx,1
0046BD9F |. 8BF0 mov esi,eax
0046BDA1 |. 85F6 test esi,esi
0046BDA3 |. 7E 6C jle short bos3.0046BE11
0046BDA5 |. C745 F4 01000000 mov dword ptr ss:[ebp-C],1
0046BDAC |> 8D45 E8 /lea eax,dword ptr ss:[ebp-18]
0046BDAF |. 50 |push eax
0046BDB0 |. 8B45 F4 |mov eax,dword ptr ss:[ebp-C]
0046BDB3 |. 48 |dec eax
0046BDB4 |. 8D1440 |lea edx,dword ptr ds:[eax+eax*2]
0046BDB7 |. 42 |inc edx
0046BDB8 |. B9 03000000 |mov ecx,3
0046BDBD |. 8B45 F0 |mov eax,dword ptr ss:[ebp-10]
0046BDC0 |. E8 D387F9FF |call bos3.00404598
0046BDC5 |. 8B45 E8 |mov eax,dword ptr ss:[ebp-18]
0046BDC8 |. E8 ABC6F9FF |call bos3.00408478 //进去旅游,哈哈!
0046BDCD |. 8945 E4 |mov dword ptr ss:[ebp-1C],eax
0046BDD0 |. 8B45 EC |mov eax,dword ptr ss:[ebp-14]
0046BDD3 |. 0FB64418 FF |movzx eax,byte ptr ds:[eax+ebx-1]
0046BDD8 |. 8945 E0 |mov dword ptr ss:[ebp-20],eax
0046BDDB |. 43 |inc ebx
0046BDDC |. 8B45 EC |mov eax,dword ptr ss:[ebp-14]
0046BDDF |. E8 5485F9FF |call bos3.00404338
0046BDE4 |. 3BD8 |cmp ebx,eax
0046BDE6 |. 7E 05 |jle short bos3.0046BDED
0046BDE8 |. BB 01000000 |mov ebx,1
0046BDED |> 8B45 E4 |mov eax,dword ptr ss:[ebp-1C]
0046BDF0 |. 3345 E0 |xor eax,dword ptr ss:[ebp-20]
0046BDF3 |. 8945 DC |mov dword ptr ss:[ebp-24],eax
0046BDF6 |. 8D45 D8 |lea eax,dword ptr ss:[ebp-28]
0046BDF9 |. 8B55 DC |mov edx,dword ptr ss:[ebp-24]
0046BDFC |. E8 5F84F9FF |call bos3.00404260
0046BE01 |. 8B55 D8 |mov edx,dword ptr ss:[ebp-28]
0046BE04 |. 8BC7 |mov eax,edi
0046BE06 |. E8 3585F9FF |call bos3.00404340
0046BE0B |. FF45 F4 |inc dword ptr ss:[ebp-C]
0046BE0E |. 4E |dec esi
0046BE0F |.^ 75 9B \jnz short bos3.0046BDAC
0046BE11 |> 33C0 xor eax,eax
0046BE13 |. 5A pop edx
0046BE14 |. 59 pop ecx
0046BE15 |. 59 pop ecx
0046BE16 |. 64:8910 mov dword ptr fs:[eax],edx
0046BE19 |. 68 48BE4600 push bos3.0046BE48
0046BE1E |> 8D45 D8 lea eax,dword ptr ss:[ebp-28]
0046BE21 |. E8 5282F9FF call bos3.00404078
0046BE26 |. 8D45 E8 lea eax,dword ptr ss:[ebp-18]
0046BE29 |. BA 03000000 mov edx,3
0046BE2E |. E8 6982F9FF call bos3.0040409C
0046BE33 |. 8D45 F8 lea eax,dword ptr ss:[ebp-8]
0046BE36 |. BA 02000000 mov edx,2
0046BE3B |. E8 5C82F9FF call bos3.0040409C
0046BE40 \. C3 retn
0046BE41 .^ E9 367CF9FF jmp bos3.00403A7C
0046BE46 .^ EB D6 jmp short bos3.0046BE1E
0046BE48 . 5F pop edi
0046BE49 . 5E pop esi
0046BE4A . 5B pop ebx
0046BE4B . 8BE5 mov esp,ebp
0046BE4D . 5D pop ebp
0046BE4E . C3 retn
***********************************************************************
call bos3.00404078
00408478 /$ 53 push ebx
00408479 |. 56 push esi
0040847A |. 83C4 F4 add esp,-0C
0040847D |. 8BD8 mov ebx,eax
0040847F |. 8BD4 mov edx,esp
00408481 |. 8BC3 mov eax,ebx
00408483 |. E8 D4A8FFFF call bos3.00402D5C //这里跟进去
00408488 |. 8BF0 mov esi,eax
0040848A |. 833C24 00 cmp dword ptr ss:[esp],0
0040848E |. 74 19 je short bos3.004084A9
00408490 |. 895C24 04 mov dword ptr ss:[esp+4],ebx
00408494 |. C64424 08 0B mov byte ptr ss:[esp+8],0B
00408499 |. 8D5424 04 lea edx,dword ptr ss:[esp+4]
0040849D |. A1 D4E24600 mov eax,dword ptr ds:[46E2D4]
004084A2 |. 33C9 xor ecx,ecx
004084A4 |. E8 9BFAFFFF call bos3.00407F44
004084A9 |> 8BC6 mov eax,esi
004084AB |. 83C4 0C add esp,0C
004084AE |. 5E pop esi
004084AF |. 5B pop ebx
004084B0 \. C3 retn
***********************************************************************
call bos3.00402D5C 关键计算
00402D5C /$ 53 push ebx
00402D5D |. 56 push esi
00402D5E |. 57 push edi
00402D5F |. 89C6 mov esi,eax
00402D61 |. 50 push eax
00402D62 |. 85C0 test eax,eax
00402D64 |. 74 6C je short bos3.00402DD2
00402D66 |. 31C0 xor eax,eax
00402D68 |. 31DB xor ebx,ebx
00402D6A |. BF CCCCCC0C mov edi,0CCCCCCC
00402D6F |> 8A1E /mov bl,byte ptr ds:[esi]
00402D71 |. 46 |inc esi
00402D72 |. 80FB 20 |cmp bl,20
00402D75 |.^ 74 F8 \je short bos3.00402D6F
00402D77 |. B5 00 mov ch,0
00402D79 |. 80FB 2D cmp bl,2D
00402D7C |. 74 62 je short bos3.00402DE0
00402D7E |. 80FB 2B cmp bl,2B
00402D81 |. 74 5F je short bos3.00402DE2
00402D83 |> 80FB 24 cmp bl,24
00402D86 |. 74 5F je short bos3.00402DE7
00402D88 |. 80FB 78 cmp bl,78
00402D8B |. 74 5A je short bos3.00402DE7
00402D8D |. 80FB 58 cmp bl,58
00402D90 |. 74 55 je short bos3.00402DE7
00402D92 |. 80FB 30 cmp bl,30
00402D95 |. 75 13 jnz short bos3.00402DAA
00402D97 |. 8A1E mov bl,byte ptr ds:[esi]
00402D99 |. 46 inc esi
00402D9A |. 80FB 78 cmp bl,78
00402D9D |. 74 48 je short bos3.00402DE7
00402D9F |. 80FB 58 cmp bl,58
00402DA2 |. 74 43 je short bos3.00402DE7
00402DA4 |. 84DB test bl,bl
00402DA6 |. 74 20 je short bos3.00402DC8
00402DA8 |. EB 04 jmp short bos3.00402DAE
00402DAA |> 84DB test bl,bl
00402DAC |. 74 2D je short bos3.00402DDB
00402DAE |> 80EB 30 /sub bl,30
00402DB1 |. 80FB 09 |cmp bl,9
00402DB4 77 25 |ja short bos3.00402DDB
00402DB6 |. 39F8 |cmp eax,edi
00402DB8 |. 77 21 |ja short bos3.00402DDB
00402DBA |. 8D0480 |lea eax,dword ptr ds:[eax+eax*4] //关键
00402DBD |. 01C0 |add eax,eax
00402DBF |. 01D8 |add eax,ebx
00402DC1 |. 8A1E |mov bl,byte ptr ds:[esi]
00402DC3 |. 46 |inc esi
00402DC4 |. 84DB |test bl,bl
00402DC6 |.^ 75 E6 \jnz short bos3.00402DAE
00402DC8 |> FECD dec ch
00402DCA |. 74 09 je short bos3.00402DD5
00402DCC |. 85C0 test eax,eax
00402DCE |. 7D 54 jge short bos3.00402E24
00402DD0 |. EB 09 jmp short bos3.00402DDB
00402DD2 |> 46 inc esi
00402DD3 |. EB 06 jmp short bos3.00402DDB
00402DD5 |> F7D8 neg eax
00402DD7 |. 7E 4B jle short bos3.00402E24
00402DD9 |. 78 49 js short bos3.00402E24
00402DDB |> 5B pop ebx ; Default case of switch 00402DFB
00402DDC |. 29DE sub esi,ebx
00402DDE |. EB 47 jmp short bos3.00402E27
00402DE0 |> FEC5 inc ch
00402DE2 |> 8A1E mov bl,byte ptr ds:[esi]
00402DE4 |. 46 inc esi
00402DE5 |.^ EB 9C jmp short bos3.00402D83
00402DE7 |> BF FFFFFF0F mov edi,0FFFFFFF
00402DEC |. 8A1E mov bl,byte ptr ds:[esi]
00402DEE |. 46 inc esi
00402DEF |. 84DB test bl,bl
00402DF1 |.^ 74 DF je short bos3.00402DD2
00402DF3 |> 80FB 61 /cmp bl,61
00402DF6 |. 72 03 |jb short bos3.00402DFB
00402DF8 |. 80EB 20 |sub bl,20
00402DFB |> 80EB 30 |sub bl,30 ; Switch (cases 30..46)
00402DFE |. 80FB 09 |cmp bl,9
00402E01 |. 76 0B |jbe short bos3.00402E0E
00402E03 |. 80EB 11 |sub bl,11
00402E06 |. 80FB 05 |cmp bl,5
00402E09 |.^ 77 D0 |ja short bos3.00402DDB
00402E0B |. 80C3 0A |add bl,0A ; Cases 41 ('A'),42 ('B'),43 ('C'),44 ('D'),45 ('E'),46 ('F') of switch 00402DFB
00402E0E |> 39F8 |cmp eax,edi ; Cases 30 ('0'),31 ('1'),32 ('2'),33 ('3'),34 ('4'),35 ('5'),36 ('6'),37 ('7'),38 ('8'),39 ('9') of switch 00402DFB
00402E10 |.^ 77 C9 |ja short bos3.00402DDB
00402E12 |. C1E0 04 |shl eax,4
00402E15 |. 01D8 |add eax,ebx
00402E17 |. 8A1E |mov bl,byte ptr ds:[esi]
00402E19 |. 46 |inc esi
00402E1A |. 84DB |test bl,bl
00402E1C |.^ 75 D5 \jnz short bos3.00402DF3
00402E1E |. FECD dec ch
00402E20 |. 75 02 jnz short bos3.00402E24
00402E22 |. F7D8 neg eax
00402E24 |> 59 pop ecx
00402E25 |. 31F6 xor esi,esi
00402E27 |> 8932 mov dword ptr ds:[edx],esi
00402E29 |. 5F pop edi
00402E2A |. 5E pop esi
00402E2B |. 5B pop ebx
00402E2C \. C3 retn ***********************************************************************
call bos3.00404484 比较
00404484 /$ 53 push ebx
00404485 |. 56 push esi
00404486 |. 57 push edi
00404487 |. 89C6 mov esi,eax
00404489 |. 89D7 mov edi,edx
0040448B |. 39D0 cmp eax,edx
0040448D |. 0F84 8F000000 je bos3.00404522
00404493 |. 85F6 test esi,esi
00404495 74 68 je short bos3.004044FF
00404497 |. 85FF test edi,edi
00404499 |. 74 6B je short bos3.00404506
0040449B |. 8B46 FC mov eax,dword ptr ds:[esi-4]
0040449E |. 8B57 FC mov edx,dword ptr ds:[edi-4]
004044A1 |. 29D0 sub eax,edx
004044A3 |. 77 02 ja short bos3.004044A7
004044A5 |. 01C2 add edx,eax
004044A7 |> 52 push edx
004044A8 |. C1EA 02 shr edx,2
004044AB |. 74 26 je short bos3.004044D3
004044AD |> 8B0E /mov ecx,dword ptr ds:[esi]
004044AF |. 8B1F |mov ebx,dword ptr ds:[edi]
004044B1 |. 39D9 |cmp ecx,ebx
004044B3 |. 75 58 |jnz short bos3.0040450D
004044B5 |. 4A |dec edx
004044B6 |. 74 15 |je short bos3.004044CD
004044B8 |. 8B4E 04 |mov ecx,dword ptr ds:[esi+4]
004044BB |. 8B5F 04 |mov ebx,dword ptr ds:[edi+4]
004044BE |. 39D9 |cmp ecx,ebx
004044C0 |. 75 4B |jnz short bos3.0040450D
004044C2 |. 83C6 08 |add esi,8
004044C5 |. 83C7 08 |add edi,8
004044C8 |. 4A |dec edx
004044C9 |.^ 75 E2 \jnz short bos3.004044AD
004044CB |. EB 06 jmp short bos3.004044D3
004044CD |> 83C6 04 add esi,4
004044D0 |. 83C7 04 add edi,4
004044D3 |> 5A pop edx
004044D4 |. 83E2 03 and edx,3
004044D7 |. 74 22 je short bos3.004044FB
004044D9 |. 8B0E mov ecx,dword ptr ds:[esi]
004044DB |. 8B1F mov ebx,dword ptr ds:[edi]
004044DD |. 38D9 cmp cl,bl
004044DF 75 41 jnz short bos3.00404522
004044E1 |. 4A dec edx
004044E2 74 17 je short bos3.004044FB
004044E4 |. 38FD cmp ch,bh
004044E6 75 3A jnz short bos3.00404522
004044E8 |. 4A dec edx
004044E9 |. 74 10 je short bos3.004044FB
004044EB |. 81E3 0000FF00 and ebx,0FF0000
004044F1 |. 81E1 0000FF00 and ecx,0FF0000
004044F7 |. 39D9 cmp ecx,ebx
004044F9 75 27 jnz short bos3.00404522
004044FB |> 01C0 add eax,eax
004044FD |. EB 23 jmp short bos3.00404522
004044FF |> 8B57 FC mov edx,dword ptr ds:[edi-4]
00404502 |. 29D0 sub eax,edx
00404504 |. EB 1C jmp short bos3.00404522
00404506 |> 8B46 FC mov eax,dword ptr ds:[esi-4]
00404509 |. 29D0 sub eax,edx
0040450B |. EB 15 jmp short bos3.00404522
0040450D |> 5A pop edx
0040450E |. 38D9 cmp cl,bl
00404510 |. 75 10 jnz short bos3.00404522
00404512 |. 38FD cmp ch,bh
00404514 |. 75 0C jnz short bos3.00404522
00404516 |. C1E9 10 shr ecx,10
00404519 |. C1EB 10 shr ebx,10
0040451C |. 38D9 cmp cl,bl
0040451E |. 75 02 jnz short bos3.00404522
00404520 |. 38FD cmp ch,bh
00404522 |> 5F pop edi
00404523 |. 5E pop esi
00404524 |. 5B pop ebx
00404525 \. C3 retn
***********************************************************************
直接说重点,就说注册算法~~相信你看完我的破得不能再破的破文,就知道该怎么做了~~~
这个咚咚的注册码跟输入的用户名无关!也许有关,但已经无所谓了!反正密码已经找出来了!
用户名密码:
792789795
b o s
62 6f 76
上面的计算结果分别对应下列字符,不等就over
z z h
7a 7a 68 序列号密码:
852854843866860843834854863862865859853837850862832894859851832853855
b o s S o f t b o s S o f t b o s S o f t b o
62 6f 76 52 6f 66 74 62 6f 73 53 6f 66 74 62 6f 73 53 6f 66 74 62 6f
上面的计算结果分别对应下列字符,不等就over
6 9 8 1 3 - 6 4 0 - 2 4 3 1 0 1 3 - 4 5 4 7 8 程序给出bosSoft为一个固定值,用来进行计算
程序给出zzh为一个固定值,用来与计算出来的用户名密码作比较,相同则程序继续进行,否则去死!
程序给出69813-640-2431013-45478为一个固定值用来与计算出来的序列号密码作比较,相同那当然就说“你是高手,成功啦”哈哈~~~ 输入假序列号密码:565656
输入假用户名密码:787878
程序首先取假用户名密码787878前三位计算
计算过程:例如取787878前三位为787
假码787(7+7*4)*2+8=4E (4E+4E*4)*2+7=313 xor 62(b)=371
真码792(7+7*4)*2+9=4F (4F+4F*4)*2+2=318 xor 62(b)=37a
程序取计算结果后两位数与z(7a)比较,不相等就和你说拜拜~~~,相等就继续下一个计算结果比较,以此类推,与zzh分别比较,由此可见用户名密码必须是3个为一组的数字共3组,9个数字。每组按顺序对应用来比较的字符。
找出了用户名密码,那在找出序列号密码,也就不难了~~~慢慢用计算器自己算吧,嘿嘿~~~3个数字为一组,共23组,分别对应程序给出的用来比较的字符。
再来一个反推过程,如852->62(b)->36(6)
36 xor 62 = 54
根据程序的计算方式得:
(8+8*4)*2+5=55
(55+55*4)*2=352
352+2=354 程序取后两位数就是54 xor 62(b)= 36(6)
注册信息保存在SystemSet.ini文件中:
[SoftWareSet]
Product_Id=852854843866860843834854863862865859853837850862832894859851832853855
RegeditName=792789795
删除可以重新注册~~~!!!
我说完了~~~~困,就一个字。睡觉!!!!天哪明天早上7点就得起床!破解真的比上班还辛苦呀!~~~~~
破是破点,说不定还还能混个“精”...哈哈哈~~~~~
距上一篇破文有两年时间没有写过破文了!
好好学习(恨浩)
2005.1.26 凌晨2:00
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课