从轻松试卷 v4.03 的破解看 r fl z 的妙用

日期:2003年6月8日 作者:PaulYoung 人气: 338

★从轻松试卷 v4.03 的破解看 r fl z 的妙用★

作者:PaulYoung
E-mail:paulyoung@yeah.net
软件简介:顾名思义啦。
URL:http://easypaper.yeah.net (最新版本是 v4.04 ,相信也差不了多少)
破解工具:SOFT-ICE V4.0.5
二○○一年三月二十四日凌晨


首先感谢★小牧童★大师的指点,才能使我能用 W32DASM V8.93 反汇编轻松试卷。虽然我是用动态跟踪破解的,但要写破解心得,首选还是 w32DASM 。



好了,首先自我介绍一番,我是名初学者,学了个把两个月破解吧,因此,汇编知识自然是鸟之又鸟的了,但熟能生巧嘛,而且我又是看雪破解论坛的常客,一来二往,真的学了不少东西。

最近我学了一招 r fl z ,功能大概跟 a 指令差不多吧,不过我觉得它按起来顺手多了。TRW2000 和 SOFT-ICE 均可使用,灵活运用,对破解能起到事半功倍的作用。

下面,我就以轻松试卷为例,看看 r fl z 有何妙处吧。

1、运行轻松试卷,在注册框的学校/单位、用户名、注册号处填写,随你便啦。
2、Ctrl+D 激活SOFT-ICE,下 BPX HMEMCPY。F5 退出,点击确定,被拦截。
3、下 BD * ,中断所有断点。
4、按12次 F12 (因为13次出错),开始看:

:004019A5 8D4DF8                  lea ecx, dword ptr [ebp-08]        //程序入口
:004019A8 51                      push ecx
:004019A9 8BD7                    mov edx, edi
:004019AB 8D45F4                  lea eax, dword ptr [ebp-0C]
:004019AE E8D5721200              call 00528C88
:004019B3 FF431C                  inc [ebx+1C]
:004019B6 8D55F4                  lea edx, dword ptr [ebp-0C]
:004019B9 58                      pop eax
:004019BA E80D751200              call 00528ECC
:004019BF 50                      push eax
:004019C0 FF4B1C                  dec [ebx+1C]
:004019C3 8D45F4                  lea eax, dword ptr [ebp-0C]
:004019C6 BA02000000              mov edx, 00000002
:004019CB E818741200              call 00528DE8
:004019D0 FF4B1C                  dec [ebx+1C]
:004019D3 8D45F8                  lea eax, dword ptr [ebp-08]
:004019D6 BA02000000              mov edx, 00000002
:004019DB E808741200              call 00528DE8              //学校名、单位名不能为空(我掉头就溜……)
:004019E0 59                      pop ecx
:004019E1 84C9                    test cl, cl
:004019E3 745F                    je 00401A44        //下 r fl z ,F5退出,可看到上面提示
:004019E5 66C743101400            mov [ebx+10], 0014
:004019EB 8D5701                  lea edx, dword ptr [edi+01]
:004019EE 8D45F0                  lea eax, dword ptr [ebp-10]
:004019F1 E892721200              call 00528C88
:004019F6 FF431C                  inc [ebx+1C]
:004019F9 8D45F0                  lea eax, dword ptr [ebp-10]
:004019FC 33D2                    xor edx, edx
:004019FE 8955EC                  mov dword ptr [ebp-14], edx
:00401A01 8D55EC                  lea edx, dword ptr [ebp-14]
:00401A04 FF431C                  inc [ebx+1C]
:00401A07 E8E8A90100              call 0041C3F4
:00401A0C 8D45EC                  lea eax, dword ptr [ebp-14]
:00401A0F 8B00                    mov eax, dword ptr [eax]
:00401A11 E886420100              call 00415C9C
:00401A16 FF4B1C                  dec [ebx+1C]
:00401A19 8D45EC                  lea eax, dword ptr [ebp-14]
:00401A1C BA02000000              mov edx, 00000002
:00401A21 E8C2731200              call 00528DE8
:00401A26 FF4B1C                  dec [ebx+1C]
:00401A29 8D45F0                  lea eax, dword ptr [ebp-10]
:00401A2C BA02000000              mov edx, 00000002
:00401A31 E8B2731200              call 00528DE8
:00401A36 8B0B                    mov ecx, dword ptr [ebx]
:00401A38 64890D00000000          mov dword ptr fs:[00000000], ecx
:00401A3F E972030000              jmp 00401DB6

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004019E3(C)
|
:00401A44 66C743102000            mov [ebx+10], 0020
:00401A4A 33C0                    xor eax, eax
:00401A4C 8945E8                  mov dword ptr [ebp-18], eax
:00401A4F 8D55E8                  lea edx, dword ptr [ebp-18]
:00401A52 FF431C                  inc [ebx+1C]
:00401A55 8B86DC020000            mov eax, dword ptr [esi+000002DC]
:00401A5B E8F8A60D00              call 004DC158
:00401A60 8D55E8                  lea edx, dword ptr [ebp-18]
:00401A63 52                      push edx
:00401A64 8D5711                  lea edx, dword ptr [edi+11]
:00401A67 8D45E4                  lea eax, dword ptr [ebp-1C]
:00401A6A E819721200              call 00528C88
:00401A6F FF431C                  inc [ebx+1C]
:00401A72 8D55E4                  lea edx, dword ptr [ebp-1C]
:00401A75 58                      pop eax
:00401A76 E851741200              call 00528ECC
:00401A7B 50                      push eax
:00401A7C FF4B1C                  dec [ebx+1C]
:00401A7F 8D45E4                  lea eax, dword ptr [ebp-1C]
:00401A82 BA02000000              mov edx, 00000002
:00401A87 E85C731200              call 00528DE8
:00401A8C FF4B1C                  dec [ebx+1C]
:00401A8F 8D45E8                  lea eax, dword ptr [ebp-18]
:00401A92 BA02000000              mov edx, 00000002
:00401A97 E84C731200              call 00528DE8                  //用户名不能为空(傻子才会跟进去)
:00401A9C 59                      pop ecx
:00401A9D 84C9                    test cl, cl
:00401A9F 745F                    je 00401B00          //下 r fl z ,F5退出,可看到上面提示
:00401AA1 66C743102C00            mov [ebx+10], 002C
:00401AA7 8D5712                  lea edx, dword ptr [edi+12]
:00401AAA 8D45E0                  lea eax, dword ptr [ebp-20]
:00401AAD E8D6711200              call 00528C88
:00401AB2 FF431C                  inc [ebx+1C]
:00401AB5 8D45E0                  lea eax, dword ptr [ebp-20]
:00401AB8 33D2                    xor edx, edx
:00401ABA 8955DC                  mov dword ptr [ebp-24], edx
:00401ABD 8D55DC                  lea edx, dword ptr [ebp-24]
:00401AC0 FF431C                  inc [ebx+1C]
:00401AC3 E82CA90100              call 0041C3F4
:00401AC8 8D45DC                  lea eax, dword ptr [ebp-24]
:00401ACB 8B00                    mov eax, dword ptr [eax]
:00401ACD E8CA410100              call 00415C9C
:00401AD2 FF4B1C                  dec [ebx+1C]
:00401AD5 8D45DC                  lea eax, dword ptr [ebp-24]
:00401AD8 BA02000000              mov edx, 00000002
:00401ADD E806731200              call 00528DE8
:00401AE2 FF4B1C                  dec [ebx+1C]
:00401AE5 8D45E0                  lea eax, dword ptr [ebp-20]
:00401AE8 BA02000000              mov edx, 00000002
:00401AED E8F6721200              call 00528DE8
:00401AF2 8B0B                    mov ecx, dword ptr [ebx]
:00401AF4 64890D00000000          mov dword ptr fs:[00000000], ecx
:00401AFB E9B6020000              jmp 00401DB6

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00401A9F(C)
|
:00401B00 66C743103800            mov [ebx+10], 0038
:00401B06 33C0                    xor eax, eax
:00401B08 8945D8                  mov dword ptr [ebp-28], eax
:00401B0B 8D55D8                  lea edx, dword ptr [ebp-28]
:00401B0E FF431C                  inc [ebx+1C]
:00401B11 8B86E0020000            mov eax, dword ptr [esi+000002E0]
:00401B17 E83CA60D00              call 004DC158
:00401B1C 8D55D8                  lea edx, dword ptr [ebp-28]
:00401B1F 52                      push edx
:00401B20 8D5724                  lea edx, dword ptr [edi+24]
:00401B23 8D45D4                  lea eax, dword ptr [ebp-2C]
:00401B26 E85D711200              call 00528C88
:00401B2B FF431C                  inc [ebx+1C]
:00401B2E 8D55D4                  lea edx, dword ptr [ebp-2C]
:00401B31 58                      pop eax
:00401B32 E895731200              call 00528ECC
:00401B37 50                      push eax
:00401B38 FF4B1C                  dec [ebx+1C]
:00401B3B 8D45D4                  lea eax, dword ptr [ebp-2C]
:00401B3E BA02000000              mov edx, 00000002
:00401B43 E8A0721200              call 00528DE8
:00401B48 FF4B1C                  dec [ebx+1C]
:00401B4B 8D45D8                  lea eax, dword ptr [ebp-28]
:00401B4E BA02000000              mov edx, 00000002
:00401B53 E890721200              call 00528DE8                        //注册号不能为空(快点走吧……)
:00401B58 59                      pop ecx
:00401B59 84C9                    test cl, cl
:00401B5B 745F                    je 00401BBC             //下 r fl z ,F5退出,可看到上面提示
:00401B5D 66C743104400            mov [ebx+10], 0044
:00401B63 8D5725                  lea edx, dword ptr [edi+25]
:00401B66 8D45D0                  lea eax, dword ptr [ebp-30]
:00401B69 E81A711200              call 00528C88
:00401B6E FF431C                  inc [ebx+1C]
:00401B71 8D45D0                  lea eax, dword ptr [ebp-30]
:00401B74 33D2                    xor edx, edx
:00401B76 8955CC                  mov dword ptr [ebp-34], edx
:00401B79 8D55CC                  lea edx, dword ptr [ebp-34]
:00401B7C FF431C                  inc [ebx+1C]
:00401B7F E870A80100              call 0041C3F4
:00401B84 8D45CC                  lea eax, dword ptr [ebp-34]
:00401B87 8B00                    mov eax, dword ptr [eax]
:00401B89 E80E410100              call 00415C9C
:00401B8E FF4B1C                  dec [ebx+1C]
:00401B91 8D45CC                  lea eax, dword ptr [ebp-34]
:00401B94 BA02000000              mov edx, 00000002
:00401B99 E84A721200              call 00528DE8
:00401B9E FF4B1C                  dec [ebx+1C]
:00401BA1 8D45D0                  lea eax, dword ptr [ebp-30]
:00401BA4 BA02000000              mov edx, 00000002
:00401BA9 E83A721200              call 00528DE8
:00401BAE 8B0B                    mov ecx, dword ptr [ebx]
:00401BB0 64890D00000000          mov dword ptr fs:[00000000], ecx
:00401BB7 E9FA010000              jmp 00401DB6

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00401B5B(C)
|
:00401BBC 66C743105C00            mov [ebx+10], 005C
:00401BC2 33C0                    xor eax, eax
:00401BC4 8945C4                  mov dword ptr [ebp-3C], eax
:00401BC7 8D55C4                  lea edx, dword ptr [ebp-3C]
:00401BCA FF431C                  inc [ebx+1C]
:00401BCD 8B86D8020000            mov eax, dword ptr [esi+000002D8]
:00401BD3 E880A50D00              call 004DC158
:00401BD8 8D55C4                  lea edx, dword ptr [ebp-3C]
:00401BDB 33C0                    xor eax, eax
:00401BDD 8B0A                    mov ecx, dword ptr [edx]
:00401BDF 8D55C8                  lea edx, dword ptr [ebp-38]
:00401BE2 51                      push ecx
:00401BE3 8945C8                  mov dword ptr [ebp-38], eax
:00401BE6 FF431C                  inc [ebx+1C]
:00401BE9 8B86DC020000            mov eax, dword ptr [esi+000002DC]
:00401BEF E864A50D00              call 004DC158
:00401BF4 8D45C8                  lea eax, dword ptr [ebp-38]
:00401BF7 8B00                    mov eax, dword ptr [eax]
:00401BF9 33D2                    xor edx, edx
:00401BFB 8955FC                  mov dword ptr [ebp-04], edx
:00401BFE 8D4DFC                  lea ecx, dword ptr [ebp-04]
:00401C01 FF431C                  inc [ebx+1C]
:00401C04 5A                      pop edx
:00401C05 E8762C0100              call 00414880
:00401C0A FF4B1C                  dec [ebx+1C]
:00401C0D 8D45C4                  lea eax, dword ptr [ebp-3C]
:00401C10 BA02000000              mov edx, 00000002
:00401C15 E8CE711200              call 00528DE8
:00401C1A FF4B1C                  dec [ebx+1C]
:00401C1D 8D45C8                  lea eax, dword ptr [ebp-38]
:00401C20 BA02000000              mov edx, 00000002
:00401C25 E8BE711200              call 00528DE8
:00401C2A 66C743105000            mov [ebx+10], 0050
:00401C30 66C743106800            mov [ebx+10], 0068
:00401C36 33C0                    xor eax, eax
:00401C38 8945C0                  mov dword ptr [ebp-40], eax
:00401C3B 8D55C0                  lea edx, dword ptr [ebp-40]
:00401C3E FF431C                  inc [ebx+1C]
:00401C41 8B86E0020000            mov eax, dword ptr [esi+000002E0]
:00401C47 E80CA50D00              call 004DC158
:00401C4C 8D55C0                  lea edx, dword ptr [ebp-40]
:00401C4F 8D45FC                  lea eax, dword ptr [ebp-04]
:00401C52 E875721200              call 00528ECC
:00401C57 50                      push eax
:00401C58 FF4B1C                  dec [ebx+1C]
:00401C5B 8D45C0                  lea eax, dword ptr [ebp-40]
:00401C5E BA02000000              mov edx, 00000002
:00401C63 E880711200              call 00528DE8            //恭喜你,你已成功注册(哈……哈……,快成功了!)
:00401C68 59                      pop ecx
:00401C69 84C9                    test cl, cl
:00401C6B 0F84C0000000            je 00401D31       //下 r fl z ,F5退出,可看到上面提示
:00401C71 66C743107400            mov [ebx+10], 0074
:00401C77 33C0                    xor eax, eax
:00401C79 8945BC                  mov dword ptr [ebp-44], eax
:00401C7C 8D55BC                  lea edx, dword ptr [ebp-44]
:00401C7F FF431C                  inc [ebx+1C]
:00401C82 8B86D8020000            mov eax, dword ptr [esi+000002D8]
:00401C88 E8CBA40D00              call 004DC158
:00401C8D 8D55BC                  lea edx, dword ptr [ebp-44]
:00401C90 33C0                    xor eax, eax
:00401C92 8B0A                    mov ecx, dword ptr [edx]
:00401C94 8D55B8                  lea edx, dword ptr [ebp-48]
:00401C97 51                      push ecx
:00401C98 8945B8                  mov dword ptr [ebp-48], eax
:00401C9B FF431C                  inc [ebx+1C]
:00401C9E 8B86DC020000            mov eax, dword ptr [esi+000002DC]
:00401CA4 E8AFA40D00              call 004DC158
:00401CA9 8D55B8                  lea edx, dword ptr [ebp-48]
:00401CAC 8B0A                    mov ecx, dword ptr [edx]
:00401CAE 51                      push ecx
:00401CAF E818340100              call 004150CC
:00401CB4 83C408                  add esp, 00000008
:00401CB7 FF4B1C                  dec [ebx+1C]
:00401CBA 8D45B8                  lea eax, dword ptr [ebp-48]
:00401CBD BA02000000              mov edx, 00000002                    //D EDX ,ALT+↑可看到注册码
:00401CC2 E821711200              call 00528DE8
:00401CC7 FF4B1C                  dec [ebx+1C]
:00401CCA 8D45BC                  lea eax, dword ptr [ebp-44]
:00401CCD BA02000000              mov edx, 00000002
:00401CD2 E811711200              call 00528DE8
:00401CD7 66C743108000            mov [ebx+10], 0080
:00401CDD 8D573D                  lea edx, dword ptr [edi+3D]
:00401CE0 8D45B4                  lea eax, dword ptr [ebp-4C]
:00401CE3 E8A06F1200              call 00528C88
:00401CE8 FF431C                  inc [ebx+1C]
:00401CEB 8D45B4                  lea eax, dword ptr [ebp-4C]
:00401CEE 33D2                    xor edx, edx
:00401CF0 8955B0                  mov dword ptr [ebp-50], edx
:00401CF3 8D55B0                  lea edx, dword ptr [ebp-50]
:00401CF6 FF431C                  inc [ebx+1C]
:00401CF9 E8F6A60100              call 0041C3F4
:00401CFE 8D45B0                  lea eax, dword ptr [ebp-50]
:00401D01 8B00                    mov eax, dword ptr [eax]
:00401D03 E8B03E0100              call 00415BB8                //弹出“恭喜你,你已成功注册”窗口


**************************************************************************************************************

大家明白了吗?r fl z 并不会真的修改程序,只是起到模拟的作用,用它来验证某些 CALL 的功能非常好用,象我这种不太懂汇编的初学者来说,看到可疑的 CALL 与 jne,je 时,在jne/je 处下 r fl z ,再 F5 退出,看一看提示,就毋须象以前那样乱 D or ?一通,甚至 F8 跟入,徒劳无功了。如象 00401C63 处,在 00401C6B je 00401D31 处下 r fl z,弹出成功窗口,说明这个call有问题,虽然跟进这个 call 只能看到正确注册码的前三位,但很多软件还是用这种办法直接找到注册码或 F8 跟入再找到注册码的。

注:1、各位验证某个 call 时最好先 BD * 中断之前的所有断点,再在这个 call 设断,下 r fl z ,F5 退出后,如果发现不是验证注册码的 call ,按确定一般都可以被 TRW2000,SOFT-ICE 拦截,以便继续验证。(因为验证可能不止一次,如上例,以免重复作无谓的劳动。)
2、00401C6B je 00401D31 处必须下 r fl z,否则你是不可能来到00401CBD mov edx, 00000002的,切记,切记!

Contributors: FHL