分享
 
 
 

VBox4.1脱壳

王朝vb·作者佚名  2008-05-21
窄屏简体版  字體: |||超大  

其实VBox 4.1脱壳和VBox 4.0.3 脱壳时的入口点差不多,可以手动脱或 Procdump脱。这里附一篇英文的文章。

You may have already heard of TR&TRW. It is a wonderful debugger provided by Liutaotao.I could't say have much I like it. VBOXT410.DLL can't find TRW at all. I could't give you a patch for VBox. I just can tell VBox how to work.

First of all, install the VBox builder (you need to get a . prv file from their webserver, so connect to the internet for this and fill the form needed). Then choose a .EXE file to protect (you could choose also a .DLL or an .OCX, but choose an . EXE because it's better and easier for cracking purposes. I choose Official phrozen crew trial crackme) and wrap it with VBox using the builder (choose now the Trial days protection).

Now the fun begins. And as we can easily see, the whole VBox protection scheme consist of only one dll which is copied into your WINDOWSVBoxcommand directories. The name of our target DLL is VBOXT402.DLL. It is packed.

Step 1

Let's change time to 30 days later. Now you can run CRACKME.EXE. When VBox window appears, CTRL-N, enter TRW. You can use 'hwnd' to find VBox window's hwnd. Something like xxxx.

bpmsg xxxx wm_destroy - just like in SoftICE

g - come back to VBox

Press 'quit' button.

Now you are in TRW.

bc * - clear break point

Press F12 a few times, until you come here in VBOXT402.DLL07006079: call [dword dialogparama]0700607f: mov esi,eax ;if you press 'try' eax=0, 'quit' eax=1; sochange eax to 0 ... r eax 0.There have some others check07001c03: cmp [ebp-10],eax ; if eax=[ebp-10], error dialog will appear; sochange eax07001c06: jne 07001c2c07001c08: lea eax,[ebp+10]07001c0b: lea ecx,[ebp-74]07001c0e: push eax07001c0f: mov [ebp-78],ebx07001c12: call 0702e7d007001c17: lea eax,[ebp-7c]07001c1a: push 0707056807001c1f: push eax07001c20: mov [dword ebp-7c],0706e00407001c27: call 070570a007001c2c: lea ecx,[ebp-28]07001c2f: mov [byte ebp-040,0407001c2c: lea ecx,[ebp-28]07001c2f: mov [byte ebp-04],0407001c33: call 0702d44007001c38: lea ecx,[ebp-18]07001c3b: mov [byte ebp-04],0207001c3f: call 0702d440.......07001c7c: call 0703257007001c71: cmp [ebp-10],eax ; Another check.07001c74: jne 07001f9b; if eax=[ebp-10], error dialog will appear. Sochange eax

Ok, now theoretically our patch is done ...

1. 07006079: call [dword dialogparama] patch to 07006079: xor eax,eax0700607b: nop0700607c: nop0700607d: nop0700607e: nop

2. 07001c06: jne 07001c2c patch to07001c06: jmp 07001c2c

3. 07001c74: jne 07001f9b patch to07001c74: jmp 07001f9b

VBox screen will not appear anymore BUT:

we just did it in memory, that's not permanent, as you all know very well ...

We must now apply our patch on the real file. But VBOXT403.DLL is packed?

Step 2 Close TRW. (TRW's bpm function doesn't seem to work there)

Let's run SoftICE. (VBox Unpacked code firstly, then check SoftICE)

load crackme.exe

bpm xxxx: 07006079 w;

Ok, so set this breakpoint and rerun. You will land in VBOXT410.DLL here:

009c01b7: repz movsd009c01b9: mov ecx,edx009c01bb: and ecx,03.......

Oh my GOD!! It is encrypted before running.

Therefore you could't find these code inside VBOXT410.DLL.

bpm xxxx: 009c01b7 w;

So set this breakpoint and re-run. You will land in here:00a001b7:repz movsd 00a001b9:mov ecx,edx 00a001bb:and ecx,03 .......

Try again.

bpm xxxx:00a001b7 w;

So set this breakpoint and re-run. You will land in here:07093c27:mov [edi],al 07093c23:inc edi 07093c24:inc ebp .......

Try again.

bpm xxxx:070093c27 w;

So set this breakpoint and rerun. You will land in here:

:07093422 03D0 add edx, eax:07093424 C1E902 shr ecx, 02:07093427 F3 repz:07093428 A5 movsd ; here!!!:07093429 8BCD mov ecx, ebp:0709342B 89542414 mov dword ptr [esp+14], edx:0709342F 83E103 and ecx, 00000003:07093432 F3 repz:07093433 A4 movsb:07093434 8B4344 mov eax, dword ptr [ebx+44]

Yes,you can find these code in VBOTT410.DLL

It is almost same when you bpm xxxx:07001c06 or bpm xxxx:07001c74 Frankly, I did not find an elegant way to patch it.

It modifies itself quite a lot.

If find an elegant way to patch it, please let me know.

Now I try to get a clean routine using another approach.

But it does not always work, beware!

So let's forget for a while our VBOXT402.DLL. We just want a clean routine.

Run TRW.

Change eax at:

1. 07006079: call [dword dialogparama]2. 07001c06: jne 07001c2c3. 07001c74: jne 07001f9b

So I just run our 'Official phrozen crew trial crackme' a window pop-up. Press 'ok', enter it's main routine window.

Now find its hwnd (you know how to do this, I hope :-), and then just bpmsg on it inside TRW.

Now: g; go back to phrozen's window,press 'exit'.

Just like before TRW pop-up.

Press F12 as long as needed to find the relevant code ...

00401029: push 0000401030: push 0040104600401032: push 0000401034: push 010040103a: push dword 0402dd870040103f: call 0040131300401041: push 00 ; you land here00401046: call 0040127d.......: ...

You can go to xxxx:00401029 directly and dump it from memory using 'pedump' command.

Then you get dump1.exe.

MKPE dump1.exe -a -s -f -i3 -ldlllist.sam

FILEOUT.EXE is our 'clean' routine, and it works very well ... so byebye VBox 4.2

As you can now see -once more- commercial ready-made protections are not so secure as they claim (look at http://www.previewsoftware.com).

But at times my FILEOUT.EXE approach doesn't work ... I wonder why ... Unfortunately I did not find any clear patterns to reverse this little mistery. If you understand this, or if you have any other good methods for this target, please let me know, we will modify together this essay.

 
 
 
免责声明:本文为网络用户发布,其观点仅代表作者个人观点,与本站无关,本站仅提供信息存储服务。文中陈述内容未经本站证实,其真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。
2023年上半年GDP全球前十五强
 百态   2023-10-24
美众议院议长启动对拜登的弹劾调查
 百态   2023-09-13
上海、济南、武汉等多地出现不明坠落物
 探索   2023-09-06
印度或要将国名改为“巴拉特”
 百态   2023-09-06
男子为女友送行,买票不登机被捕
 百态   2023-08-20
手机地震预警功能怎么开?
 干货   2023-08-06
女子4年卖2套房花700多万做美容:不但没变美脸,面部还出现变形
 百态   2023-08-04
住户一楼被水淹 还冲来8头猪
 百态   2023-07-31
女子体内爬出大量瓜子状活虫
 百态   2023-07-25
地球连续35年收到神秘规律性信号,网友:不要回答!
 探索   2023-07-21
全球镓价格本周大涨27%
 探索   2023-07-09
钱都流向了那些不缺钱的人,苦都留给了能吃苦的人
 探索   2023-07-02
倩女手游刀客魅者强控制(强混乱强眩晕强睡眠)和对应控制抗性的关系
 百态   2020-08-20
美国5月9日最新疫情:美国确诊人数突破131万
 百态   2020-05-09
荷兰政府宣布将集体辞职
 干货   2020-04-30
倩女幽魂手游师徒任务情义春秋猜成语答案逍遥观:鹏程万里
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案神机营:射石饮羽
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案昆仑山:拔刀相助
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案天工阁:鬼斧神工
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案丝路古道:单枪匹马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:与虎谋皮
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:李代桃僵
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:指鹿为马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:小鸟依人
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:千金买邻
 干货   2019-11-12
 
推荐阅读
 
 
 
>>返回首頁<<
 
靜靜地坐在廢墟上,四周的荒凉一望無際,忽然覺得,淒涼也很美
© 2005- 王朝網路 版權所有