WEB开发网
开发学院网络安全黑客技术 应用olldbg脱telock加壳之菜鸟篇 阅读

应用olldbg脱telock加壳之菜鸟篇

 2007-01-12 20:12:47 来源:WEB开发网   
核心提示: 再来一次CRTL+L到此0064F21C85F6TEST ESI,ESI//关键部位到了F2设断切记,目的是DUM出完好的输入表0064F21E0F84 06040000JE cookbook.0064F62A0064F22403F2ADD ESI,EDX0064F22683A5 52D4

再来一次CRTL+L到此 

0064F21C 85F6      TEST ESI,ESI //关键部位到了F2设断切记,目的是DUM出完好的输入表 
0064F21E 0F84 06040000  JE cookbook.0064F62A 
0064F224 03F2      ADD ESI,EDX 
0064F226 83A5 52D44000 00 AND DWORD PTR SS:[EBP+40D452],0 
0064F22D 8B46 0C     MOV EAX,DWORD PTR DS:[ESI+C] 
0064F230 8366 0C 00   AND DWORD PTR DS:[ESI+C],0 //telock加壳死穴,亦可查找此关键点 
0064F234 85C0      TEST EAX,EAX 
0064F236 0F84 EE030000  JE cookbook.0064F62A 
0064F23C 03C2      ADD EAX,EDX 
0064F23E 8BD8      MOV EBX,EAX 
0064F240 50       PUSH EAX 
0064F241 FF95 D0D24000  CALL DWORD PTR SS:[EBP+40D2D0] 
0064F247 85C0      TEST EAX,EAX 
0064F249 0F85 BA000000  JNZ cookbook.0064F309 
0064F24F 53       PUSH EBX 
0064F250 FF95 E4BA4000  CALL DWORD PTR SS:[EBP+40BAE4] 
0064F256 85C0      TEST EAX,EAX 
0064F258 0F85 AB000000  JNZ cookbook.0064F309 
0064F25E 8B95 62D34000  MOV EDX,DWORD PTR SS:[EBP+40D362] 
0064F264 0195 2AD34000  ADD DWORD PTR SS:[EBP+40D32A],EDX 
0064F26A 0195 36D34000  ADD DWORD PTR SS:[EBP+40D336],EDX 
0064F270 6A 30      PUSH 30 
0064F272 53       PUSH EBX 
0064F273 FFB5 36D34000  PUSH DWORD PTR SS:[EBP+40D336] 
0064F279 EB 53      JMP SHORT cookbook.0064F2CE 
0064F27B 8B95 62D34000  MOV EDX,DWORD PTR SS:[EBP+40D362] 
0064F281 0195 2AD34000  ADD DWORD PTR SS:[EBP+40D32A],EDX
 

上一页  1 2 3 4 5  下一页

Tags:应用 olldbg telock

编辑录入:爽爽 [复制链接] [打 印]
赞助商链接