|
Тема |
PortScan crack!! |
|
Автор |
KByte (Господ) |
|
Публикувано | 29.01.02 22:19 |
|
|
S crack se zanimavam ot 1 mesec i dneska reshih da probvam da crack sam PortScan znachi startvam portscan sled tva softice natiskam ctrl+D i nabiram S: DS:0 LFFFFFFFF "00000" ostanovqvam tochka na prekysvane na tozi adress (BPMB DS:0000 RW) izlizam ot softice.Sled tva vlizam i sam v module KERNEL natiskam 5 pyti F12 okazvam se v tqloto na programata...Namiram redovete
:12D6 9A531DF812 call 0011.1D53 - ot tuk sam vleznal
:12DB 9AC737C11C call 0002.37C7 CALL 0002.37C7 - procedura na proverka..
:12E0 09C0 OR AL, AL
:12E27479 KE 135D
:12E4 8DBE00FD lea di, [bp+FD00]
:.12E8 16
Proverqvam po adres 12DB i me izhvyrlq ot proverkata na:
:37FF 50 PUSH AX
2:.3800 55 PUSH BP
:.3801 FF36980E push word ptr [0E98]
:3805 8926980E mov [0E98], sp
:.3809 80BEFEFD19 CMP BYTE PTR [BP+FDFE], 19
:.380E 7319
:.3810 80be10fe2d cmp byte ptr [bp+FE10], 2D
:3815 7412 je 3829
......
Sled tva popravqm dyljinata na vyveniqt nomer.Stigam do:
:.383E 9A8B398238 call 0002.398B
:.3843 8886FCFD mov[bp+FDFC], al
:.3847 8A86FDFD mov al , [bp+FDFD]
:.384b 3a86fcfd cmp al , [bp+FDFC]
:.384F 7506 jne 3857
:.3855 EB04 jmp 385B - prehod na procedurata
:.3857 C646FF00 mov byte ptr [bp-01], 00
:.385B 8f06980E pop word ptr [0E98]
..........
Na kratko promenqm JNE 3857 na adres 384F s JMP 3851..I startiram cracka raboti..i kato trygna da scan mi zabiva bozata (windowsa)...nekoi ako moje da mi kae na kvo se dylji tva i kade sam sbyrkal mu kazvam evala (windows98Se)....
http://mp3.nct.sh Само господ ми е навигатор....
|
| |
|
|
|