目标程序下载地址:http://opencrackmes.crackmes.de/ope...rackmes/k4n.zip
到一些黑客站点上转转,发现那些最受欢迎、点击次数最多的文章都是一些“教菜鸟使用木马”“入侵初级教程”之类文章,而“Outlook Express HTML邮件超长字节href值缓冲溢出缺陷”“PHP fopen()函数易遭到CRLF Injection攻击”这种文章却乏人问津,尽管这或许才是真正高手所关心的。
现在看雪论坛上后一种文章逐渐增多,当然是因为大家的水平都提高了,但也给刚入门的菜鸟带来了麻烦,来了之后什么也看不懂,在高手看来不是问题的问题常常困扰新手们很长时间:为什么这里是关键跳转,那边是重要CALL?为什么有的CALL要跟进,有的CALL只需带过?我按照高手所写的一步步做下去成功了,可为什么要这样做呢?我想更有不少人好不容易破了一个明码比较的软件,想贴出来又怕为高手所不屑而做罢。
因此我找了一个非常简单的CrackMe(如果你是高手,只静态调试应该就可以搞定了),从头到尾仔仔细细地写出了分析过程,在里面加入了些我认为应该注意的地方,希望能对刚入门的朋友有些帮助。我不是什么高手,最多算是破解得熟练一点儿了而已,也许这样才更能了解新手们的难处吧。
这里我用W32Dasm作为静态反汇编的工具,各位可能有用C32Asm或者其他的,基本功能其实应该差不多。
先胡乱输入用户名和注册码,点"Check the Serial",看看错误信息是什么(如果出现“注册码正确”的话就别在这儿看了,赶紧买彩票去)好出来了,“This serial is *NOT* Valid!! Try again... : UNREGISTERED”。
好了运行W32Dasm把它反汇编,在串式参考(string reference)中找吧,注意当字串较长时有时不能完全显示,这时只要找前面一段就行了,比如这次就是,找到"This serial is *NOT* Valid!! Try ",就是它了,双击来到引用该字串的地方。(PS:有时错误信息在代码中会不止一次出现,这时只要多次双击就能找到其他的地方。)
下面我要引用代码了(这是在W32DASM里的形式,如果你用OD或SI动态跟踪时形式会略有不同)。不要被这么多代码搞晕了,建议先跳过代码看我的后面的说明,再从代码中对照。
* Possible Reference to Dialog: DialogID_0001, CONTROL_ID:0066, "" | :00401085 6A66 push 00000066 ;输入用户名的文本框ID :00401087 53 push ebx ;对话框句柄 * Reference To: USER32.GetDlgItem, Ord:0000h | :00401088 E8159C0000 Call 0040ACA2 ;得到文本框句柄 :0040108D 6A64 push 00000064 ;得到字符串的最大长度 :0040108F 8D9548FFFFFF lea edx, dword ptr [ebp+FFFFFF48] :00401095 52 push edx ;EDX是存取字符串的地址 :00401096 50 push eax ;EAX是上面得到的文本框句柄 * Reference To: USER32.GetWindowTextA, Ord:0000h | :00401097 E8129C0000 Call 0040ACAE ;得到用户名,在[ebp+FFFFFF48] * Possible Reference to Dialog: DialogID_0001, CONTROL_ID:0068, "" | :0040109C 6A68 push 00000068 ;同样的操作,输入注册码的文本框ID :0040109E 53 push ebx * Reference To: USER32.GetDlgItem, Ord:0000h | :0040109F E8FE9B0000 Call 0040ACA2 :004010A4 6A64 push 00000064 :004010A6 8D8DE4FEFFFF lea ecx, dword ptr [ebp+FFFFFEE4] :004010AC 51 push ecx :004010AD 50 push eax * Reference To: USER32.GetWindowTextA, Ord:0000h | :004010AE E8FB9B0000 Call 0040ACAE ;得到注册码,在[ebp+FFFFFEE4] * Possible Reference to Dialog: DialogID_0001, CONTROL_ID:0067, "" | :004010B3 6A67 push 00000067 ;这个是最下面的提示的文本框的ID :004010B5 53 push ebx 7 * Reference To: USER32.GetDlgItem, Ord:0000h | :004010B6 E8E79B0000 Call 0040ACA2 ;得到句柄 :004010BB 8BF0 mov esi, eax ;放在ESI备用 :004010BD 8D8548FFFFFF lea eax, dword ptr [ebp+FFFFFF48] :004010C3 50 push eax ;指向用户名 :004010C4 E867050000 call 00401630 ;得到用户名长度 :004010C9 59 pop ecx :004010CA 8945D8 mov dword ptr [ebp-28], eax ;长度放在[ebp-28] :004010CD 8D95E4FEFFFF lea edx, dword ptr [ebp+FFFFFEE4] :004010D3 52 push edx ;指向注册码 :004010D4 E857050000 call 00401630 ;得到注册码长度 :004010D9 59 pop ecx :004010DA 68EAB04000 push 0040B0EA :004010DF E84C050000 call 00401630 :004010E4 59 pop ecx :004010E5 680EB14000 push 0040B10E :004010EA E841050000 call 00401630 :004010EF 59 pop ecx :004010F0 837DD803 cmp dword ptr [ebp-28], 00000003 :004010F4 7E7B jle 00401171 ;用户名长度不能小于等于3 :004010F6 90 nop :004010F7 90 nop :004010F8 90 nop :004010F9 90 nop :004010FA 33C9 xor ecx, ecx :004010FC 33D2 xor edx, edx :004010FE 33DB xor ebx, ebx :00401100 33C0 xor eax, eax :00401102 837DD832 cmp dword ptr [ebp-28], 00000032 :00401106 7D69 jge 00401171 ;用户名长度不能大于等于32h :00401108 90 nop :00401109 90 nop :0040110A 90 nop :0040110B 90 nop * Referenced by a (U)nconditional or (C)onditional Jump at Address: |:0040111C(C) | :0040110C 0FBE840D48FFFFFF movsx eax, byte ptr [ebp+ecx-000000B8];依次取用户名的字符 :00401114 41 inc ecx ;ECX为循环变量 :00401115 33C1 xor eax, ecx ;取的字符与循环变量XOR :00401117 03D8 add ebx, eax ;把结果累加到EBX :00401119 3B4DD8 cmp ecx, dword ptr [ebp-28] ;循环变量与用户名长度相比 :0040111C 75EE jne 0040110C ;如果未取完就跳回继续 :0040111E 6BC006 imul eax, 00000006 ;最后一轮计算的结果在EAX, 乘6 :00401121 C1E307 shl ebx, 07 ;前面累加结果左移7位 :00401124 03C3 add eax, ebx ;相加 :00401126 8945C8 mov dword ptr [ebp-38], eax :00401129 FF75C8 push [ebp-38] ;把上面结果压栈 * Possible StringData Ref from Data Obj ->"%lX" | :0040112C 6838B44000 push 0040B438 ;一个转换的标识 :00401131 8D8D80FEFFFF lea ecx, dword ptr [ebp+FFFFFE80] :00401137 51 push ecx ;存放转换结果的地址 :00401138 E8873D0000 call 00404EC4 ;数字转为十六进制字串 :0040113D 83C40C add esp, 0000000C :00401140 8D8580FEFFFF lea eax, dword ptr [ebp+FFFFFE80] :00401146 50 push eax ;上面转换的字串 :00401147 8D95E4FEFFFF lea edx, dword ptr [ebp+FFFFFEE4] :0040114D 52 push edx ;假注册码 * Reference To: KERNEL32.lstrcmpA, Ord:0000h | :0040114E E8339C0000 Call 0040AD86 ;比较 :00401153 85C0 test eax, eax :00401155 750D jne 00401164 ;这里就是关键的跳转 * Possible StringData Ref from Data Obj ->"Congratulations! IF this number " ->"comes *FROM YOUR* keygen, Write " ->"a tutorial dude ." | :00401157 683CB44000 push 0040B43C ;指向表示成功的字符串 :0040115C 56 push esi ;ESI还记得么?那个提示文本框的句柄 * Reference To: USER32.SetWindowTextA, Ord:0000h | :0040115D E8289B0000 Call 0040AC8A ;显示出来 :00401162 EB18 jmp 0040117C * Referenced by a (U)nconditional or (C)onditional Jump at Address: |:00401155(C) | * Possible StringData Ref from Data Obj ->"This serial is *NOT* Valid!! Try " ->"again... : UNREGISTERED" | :00401164 6890B44000 push 0040B490 ;开始时停在这句,向上找跳转 :00401169 56 push esi ;ESI提示文本框的句柄 * Reference To: USER32.SetWindowTextA, Ord:0000h | :0040116A E81B9B0000 Call 0040AC8A :0040116F EB0B jmp 0040117C * Referenced by a (U)nconditional or (C)onditional Jump at Addresses: |:004010F4(C), :00401106(C) | * Possible StringData Ref from Data Obj ->"Name must contain more than 4 " ->"chars and less than 50 chars !!" | :00401171 68C9B44000 push 0040B4C9 ;用户名不符合要求跳到这里 :00401176 56 push esi ;ESI提示文本框的句柄 * Reference To: USER32.SetWindowTextA, Ord:0000h | :00401177 E80E9B0000 Call 0040AC8A * Referenced by a (U)nconditional or (C)onditional Jump at Addresses: |:00401162(U), :0040116F(U) | :0040117C 5F pop edi :0040117D 5E pop esi :0040117E 5B pop ebx :0040117F 8BE5 mov esp, ebp :00401181 5D pop ebp ;整理一下返回了 :00401182 C3 ret
* Possible Reference to Dialog: DialogID_0001, CONTROL_ID:0066, "" | :00401085 6A66 push 00000066 ;控件ID :00401087 53 push ebx ;对话框句柄 * Reference To: USER32.GetDlgItem, Ord:0000h | :00401088 E8159C0000 Call 0040ACA2
:0040108D 6A64 push 00000064 ;最大长度 :0040108F 8D9548FFFFFF lea edx, dword ptr [ebp+FFFFFF48];把[ebp+FFFFFF48]先放在EDX里 :00401095 52 push edx ;缓冲区地址[ebp+FFFFFF48] :00401096 50 push eax ;EAX?是上面那个API的返回值呀,控件句柄 * Reference To: USER32.GetWindowTextA, Ord:0000h | :00401097 E8129C0000 Call 0040ACAE
:004010BD 8D8548FFFFFF lea eax, dword ptr [ebp+FFFFFF48] :004010C3 50 push eax :004010C4 E867050000 call 00401630
:004010C9 59 pop ecx :004010CA 8945D8 mov dword ptr [ebp-28], eax ;记住,上面的返回结果在[ebp-28] :004010CD 8D95E4FEFFFF lea edx, dword ptr [ebp+FFFFFEE4] :004010D3 52 push edx :004010D4 E857050000 call 00401630
:004010F0 837DD803 cmp dword ptr [ebp-28], 00000003 :004010F4 7E7B jle 00401171 :00401102 837DD832 cmp dword ptr [ebp-28], 00000032 :00401106 7D69 jge 00401171
* Referenced by a (U)nconditional or (C)onditional Jump at Address: |:0040111C(C) | :0040110C 0FBE840D48FFFFFF movsx eax, byte ptr [ebp+ecx-000000B8] :00401114 41 inc ecx :00401115 33C1 xor eax, ecx :00401117 03D8 add ebx, eax :00401119 3B4DD8 cmp ecx, dword ptr [ebp-28] :0040111C 75EE jne 0040110C
:0040111E 6BC006 imul eax, 00000006 ;EAX其实是上面最后一轮计算的结果,乘6 :00401121 C1E307 shl ebx, 07 ;EBX是几轮计算累加起来的结果,左移7位 :00401124 03C3 add eax, ebx ;加起来 :00401126 8945C8 mov dword ptr [ebp-38], eax :00401129 FF75C8 push [ebp-38] ;上面的结果,作为一个参数 * Possible StringData Ref from Data Obj ->"%lX" | :0040112C 6838B44000 push 0040B438 ;"%lX"有点眼熟哟 :00401131 8D8D80FEFFFF lea ecx, dword ptr [ebp+FFFFFE80] :00401137 51 push ecx ;这是什么呢? :00401138 E8873D0000 call 00404EC4 :0040113D 83C40C add esp, 0000000C
:00401140 8D8580FEFFFF lea eax, dword ptr [ebp+FFFFFE80];眼熟吗,刚才的转换结果呀 :00401146 50 push eax ;EAX指向上面转换得到的字符串 :00401147 8D95E4FEFFFF lea edx, dword ptr [ebp+FFFFFEE4];这个很早了,向前面找找是啥 :0040114D 52 push edx ;EDX指向我们输入的假注册码 * Reference To: KERNEL32.lstrcmpA, Ord:0000h | :0040114E E8339C0000 Call 0040AD86 :00401153 85C0 test eax, eax :00401155 750D jne 00401164 ;关键跳转哟
#include#include #include void main() { int EAX=0,EBX=0,len; char name[50]={0}; char password[50]={0}; printf("Please input your name:"); scanf("%s",name); len=strlen(name); for (int i=0;i