13.07.2015 Views

The art of cracking - Tutoriali

The art of cracking - Tutoriali

The art of cracking - Tutoriali

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

kada ce se u EAXu pojaviti user32.dll string. Zaci da je na red dosloodpakivanje IATa u memoriju pa cemo potraziti loop koji ce to uraditi. On senalazi ovde:00406252 83C7 04 ADD EDI,400406255 ^ EB BD JMP SHORT cr-cdl41.00406214to jest ovo je poslednja adresa loopa koji sluzi za odpakivanje API poziva umemoriju, dok se odmah ispod nalazi drugi skok:00406257 83C2 14 ADD EDX,140040625A ^ E9 55FFFFFF JMP cr-cdl41.004061B4koji sluzi za odpakivanje imena svih dll fajlova koji sadrze odpakovane APIpozive. Zbog ovog cemo postaviti dva break-pointa na adrese:004061C2 0385 47050000ADD EAX,DWORD PTR SS:[EBP+547]004061C8 52 PUSH EDX ; cr-cdl41.00404014da bi smo videli imena dll fajlova koja se nalaze u IATu. Treba nam jos jedanbreak-point za slucaj da pritisnemo F9 jednom vise puta nego sto treba.Zbog ovoga cemo postaviti break-point na adresu:0040625F 8B85 57050000 MOV EAX,DWORD PTR SS:[EBP+557]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!