有哪位高手愿意帮帮忙,非常感谢,具体我也说不明白,有能帮帮忙的请加我Q号188974267
用爆破不行,是读KEY文件的,跟踪验证函数得出了28位注册码,还差两位,够残酷的,一共30位,通过用户名使用日期和有效期验证的,有高手来试试吗?
我有正确的KEY文件
008804BF |. 8B4D A0 mov ecx,dword ptr ss:[ebp-60]
008804C2 |. A1 78898>mov eax,dword ptr ds:[898978]
008804C7 |. 8B00 mov eax,dword ptr ds:[eax]
008804C9 |. 8B55 FC mov edx,dword ptr ss:[ebp-4]
008804CC |. E8 83B8F>call packClie.Ufrmpublicdatamodule::TWorker::CheckSerialNO //关键CALL,调用函数
008804D1 |. 84C0 test al,al
008804D3 |. 0F84 560>je packClie.0088062F //关键跳
函数过程
00871330 /> /55 push ebp ; (初始化 cpu 选择状态)
00871331 |. |8BEC mov ebp,esp
00871333 |. |53 push ebx
00871334 |. |56 push esi
00871335 |. |8B5D 0C mov ebx,dword ptr ss:[ebp+C]
00871338 |. |8B45 08 mov eax,dword ptr ss:[ebp+8]
0087133B |. |C605 009>mov byte ptr ds:[899000],1
00871342 |. |C605 019>mov byte ptr ds:[899001],1
00871349 |. |A3 08C08>mov dword ptr ds:[88C008],eax
0087134E |. |33D2 xor edx,edx
00871350 |. |8915 0CC>mov dword ptr ds:[88C00C],edx
00871356 |. |33D2 xor edx,edx
00871358 |. |8915 10C>mov dword ptr ds:[88C010],edx
0087135E |. |A3 04908>mov dword ptr ds:[899004],eax
00871363 |. |B8 00000>mov eax,0
00871368 |. |85C0 test eax,eax
0087136A |. |74 09 je short packClie.00871375
0087136C |. |8B349D 1>mov esi,dword ptr ds:[ebx*4+88C01C]
00871373 |. |FFD6 call esi
00871375 |> |83FB 01 cmp ebx,1
00871378 |. |75 07 jnz short packClie.00871381
0087137A |. |E8 81FFF>call packClie.00871300
0087137F |. |EB 09 jmp short packClie.0087138A
00871381 |> |85DB test ebx,ebx
00871383 |. |75 05 jnz short packClie.0087138A
00871385 |. |E8 82FFF>call packClie.0087130C
0087138A |> |83C8 FF or eax,FFFFFFFF
0087138D |. |5E pop esi
0087138E |. |5B pop ebx
0087138F |. |5D pop ebp
00871390 \. |C2 0C00 retn 0C
[培训]科锐逆向工程师培训第53期2025年7月8日开班!