2021年遗留问题:数字签名

image.png


把某软件的升级检测修改后打补丁输出了;再启动时出来了这。
原来答案很简单:
2021年遗留问题:数字签名

image.png


当来到这里时,慢慢向上找,或跨模块所有调用+程序领空,便能一步定位到关键代码处。
[Asm] 纯文本查看 复制代码
013FF6D1     | 8BEC                     | mov ebp,esp                                        |013FF6D3     | 83E4 F8                  | and esp,FFFFFFF8                                   |013FF6D6     | 81EC 3C070000            | sub esp,73C                                        |013FF6DC     | 803D EC135C01 00         | cmp byte ptr ds:[15C13EC],0                        |013FF6E3     | 53                       | push ebx                                           |013FF6E4     | 56                       | push esi                                           | esi:"p\f)"013FF6E5     | 57                       | push edi                                           |013FF6E6     | 8BD9                     | mov ebx,ecx                                        |013FF6E8     | 0F85 EC010000            | jne patch跳过启动升级检测1_保密.13FF8DA                |013FF6EE     | A0 49E15701              | mov al,byte ptr ds:[157E149]                       |013FF6F3     | 3C FF                    | cmp al,FF                                          |013FF6F5     | 75 19                    | jne patch跳过启动升级检测1_保密.13FF710                |013FF6F7     | 33D2                     | xor edx,edx                                        |013FF6F9     | B9 2CA15501              | mov ecx,patch跳过启动升级检测1_保密.155A12C            | 155A12C:L"SDS"013FF6FE     | E8 0DFD72FF              | call <patch跳过启动升级检测1_保密.sub_B2F410>          |013FF703     | 3D 689AC178              | cmp eax,78C19A68                                   |013FF708     | 0F94C0                   | sete al                                            |013FF70B     | A2 49E15701              | mov byte ptr ds:[157E149],al                       |013FF710     | 3C 01                    | cmp al,1                                                                                           | 改这里经测试不可以!013FF712     | 0F84 C2010000            | je patch跳过启动升级检测1_保密.13FF8DA                 | 尝试在这里跳过!013FF718     | 83CA FF                  | or edx,FFFFFFFF                                    |013FF71B     | 8BCB                     | mov ecx,ebx                                        |013FF71D     | E8 8E0473FF              | call <patch跳过启动升级检测1_保密.sub_B2FBB0>          |013FF722     | 85C0                     | test eax,eax                                       |013FF724     | 75 07                    | jne patch跳过启动升级检测1_保密.13FF72D                |013FF726     | 5F                       | pop edi                                            |013FF727     | 5E                       | pop esi                                            | esi:"p\f)"013FF728     | 5B                       | pop ebx                                            |013FF729     | 8BE5                     | mov esp,ebp                                        |013FF72B     | 5D                       | pop ebp                                            |013FF72C     | C3                       | ret                                                |013FF72D     | 8D4424 24                | lea eax,dword ptr ss:[esp+24]                      |013FF731     | C74424 24 10000000       | mov dword ptr ss:[esp+24],10                       |013FF739     | 894424 4C                | mov dword ptr ss:[esp+4C],eax                      |013FF73D     | 0F57C0                   | xorps xmm0,xmm0                                    |013FF740     | 8D4424 34                | lea eax,dword ptr ss:[esp+34]                      |013FF744     | 66:0F134424 2C           | movlpd qword ptr ss:[esp+2C],xmm0                  |013FF74A     | 50                       | push eax                                           |013FF74B     | 8D4424 18                | lea eax,dword ptr ss:[esp+18]                      |013FF74F     | 895C24 2C                | mov dword ptr ss:[esp+2C],ebx                      |013FF753     | 50                       | push eax                                           |013FF754     | 6A 00                    | push 0                                             |013FF756     | 66:0F134424 44           | movlpd qword ptr ss:[esp+44],xmm0                  |013FF75C     | C74424 50 00000000       | mov dword ptr ss:[esp+50],0                        | [esp+50]:sub_A9DB90013FF764     | 66:0F134424 5C           | movlpd qword ptr ss:[esp+5C],xmm0                  |013FF76A     | C74424 64 00000000       | mov dword ptr ss:[esp+64],0                        |013FF772     | 66:0F134424 6C           | movlpd qword ptr ss:[esp+6C],xmm0                  |013FF778     | C74424 40 34000000       | mov dword ptr ss:[esp+40],34                       | [esp+40]:"p\f)", 34:'4'013FF780     | C74424 4C 02000000       | mov dword ptr ss:[esp+4C],2                        |013FF788     | C74424 54 01000000       | mov dword ptr ss:[esp+54],1                        | [esp+54]:sub_A9DB90013FF790     | C74424 68 10000000       | mov dword ptr ss:[esp+68],10                       | [esp+68]:&"0嫨"013FF798     | C74424 20 6BC5AA00       | mov dword ptr ss:[esp+20],<patch跳过启动升级检测1_保密 | [esp+20]:L"燐豺"013FF7A0     | C74424 24 44CDD011       | mov dword ptr ss:[esp+24],11D0CD44                 |013FF7A8     | C74424 28 8CC200C0       | mov dword ptr ss:[esp+28],C000C28C                 |013FF7B0     | C74424 2C 4FC295EE       | mov dword ptr ss:[esp+2C],EE95C24F                 |013FF7B8     | FF15 704A4B01            | call dword ptr ds:[<&WinVerifyTrust>]             ==>此处是数字签名校验的源头(1)修改之后启动文件被修改的提示就没了!

广告合作:本站广告合作请联系QQ:858582 申请时备注:广告合作(否则不回)
免责声明:本站资源来自互联网收集,仅供用于学习和交流,请遵循相关法律法规,本站一切资源不代表本站立场,如有侵权、后门、不妥请联系本站删除!