Reversing) abex crackme #4

๋ฒ„ํŠผ ๋น„ํ™œ์„ฑํ™” ์ƒํƒœ ์ผ๋ จ๋ฒˆํ˜ธ๋Š” ๋ณดํ†ต ๋ฌธ์ž์—ด๋น„๊ต๋ฅผ ํ•˜๋ฏ€๋กœ, Search for - All intermodular calls - "vbaStrCmp" ๋ฐœ๊ฒฌ BP์„ค์ • Test DI, DI ๊ฒฐ๊ณผ์— ๋”ฐ๋ผ ์ ํ”„๋ฌธ ๋ถ„๊ธฐ. ์—ฌ๊ธฐ์„œ ZF๋ฅผ 0์œผ๋กœ ๋ฐ”๊ฟ” ํ๋ฆ„์„ ๋ฐ”๊พธ๋ฉด, Register๋ฒ„ํŠผ์ด ํ™œ์„ฑํ™”๋œ๋‹ค. ํด๋ฆญํ•˜๋ฉด ๋‹ค์Œ๊ณผ๊ฐ™์ด ์„ฑ๊ณต [๋ถ„์„] ์—ญ์ถ”์ ํ•˜๋ฉด, TEST DI, DI๋Š” DI๊ฐ’์ด 0์ธ์ง€ ํ™•์ธํ•œ๋‹ค. DI๊ฐ’์€ EDI์˜ ํ•˜์œ„16bit๊ฐ’. ๊ทธ๋ฆฌ๊ณ  ์ด DI๋Š” vbaStrCmp()์˜ ๊ฒฐ๊ณผ๊ฐ€ eax์— ์ €์žฅ๋œํ›„ ๋‹ค์‹œ edi๋กœ ๋ณต์‚ฌ๋œ๋‹ค. vbaStrCmp()๋Š” ์‹คํ–‰๋˜๋ฉฐ ์ธ์ž๋กœ eax, ecx๋ฅผ ๋„ฃ๋Š”๋‹ค. vbaStrCmp()๋ถ€๋ถ„์— BP๋ฅผ ๊ฑธ๊ณ  ๋‹ค์‹œ ์‚ดํŽด๋ณด์ž. ์žฌ์‹œ์ž‘ํ›„ ์ˆซ์ž๋ฅผ ํ•˜๋‚˜ ์ž…๋ ฅํ•˜๋ฉด BP๊ฐ€ ๊ฑธ๋ฆฐ๋‹ค. ์ด๋•Œ ์œ„์™€ ๊ฐ™์ด, eax์—” 0067..

Security&Hacking/Reversing 2019. 9. 11. 16:54
Reversing) DLL Injection with SetWindowsHookEx()

[์‚ฝ์งˆ๋…ธํŠธ] 1. dllํŒŒ์ผ์€ cppํŒŒ์ผ๋กœ ์ž‘์„ฑํ›„ ์ผ๋ฐ˜์ ์ธ VS ๋นŒ๋“œ๋ฅผ ๊ฑฐ์ณ ์ƒ์„ฑ. ๋‹จ, ํ”„๋กœ์ ํŠธ ์ƒ์„ฑ์‹œ Win32 Console, MFC ์„ ํƒํ•˜๋“ฏ์ด ์—ฌ๊ธฐ์„œ DLL์„ ์„ ํƒํ•ด์•ผํ•จ. 2. dll.cpp์—์„œ ๋ฉ”์ธ์ง„์ž…๋ถ€๋ฅผ DllMain์ด ์•„๋‹Œ, DLLMain์œผ๋กœ ์ž‘์„ฑํ•˜์—ฌ ์‹œ๊ฐ„ํ—ˆ๋น„ (dll ์ฝ”๋”ฉ๋ฐ๋นŒ๋“œ๋Š” ์ฒ˜์Œ์ด์˜€์ง€๋งŒ, ๋‹น์—ฐํžˆ ๋ ๊ฑฐ๋ผ ์ƒ๊ฐํ–ˆ๋‹ค. ์ƒ๊ฐํ•ด๋ณด๋ฉด ์ผ๋ฐ˜์ฝ˜์†”์ฝ”๋“œ์—์„œ๋„ int mAin()~๋„ ๋‹น์—ฐํžˆ ์•ˆ๋˜๋Š”๊ฑด๋ฐ..) 3. VirtualMachine์—์„œ Win7 64bit์—์„œ ๊ณ„์† ์‹คํ–‰ํ•จ. 32bit์—์„œ ํ–ˆ์–ด์•ผํ–ˆ๋‹ค. (injectํ•˜๋Š” dll์œ„์น˜๋ฟ๋งŒ์•„๋‹ˆ๋ผ ๋งŽ์€ ์š”์†Œ๋“ค์ด ๋ณ€๊ฒฝ๊ฐ€๋Šฅ์„ฑ. ๋ณ€์ˆ˜๋งŽ์Œ) [์ฐธ๊ณ ] 1. scanf => scanf_s๋กœ ๋Œ€ํ‘œ๋˜๋Š” UNSAFE WARNING ERROR ์ปดํŒŒ์ผ์˜ค๋ฅ˜์‹œ, ๊ตฌ๊ธ€๋งํ•˜๋ฉด ๋ช‡๊ฐ€์ง€ ๋ฐฉ..

๊ณต์ง€์‚ฌํ•ญ
์ตœ๊ทผ์— ์˜ฌ๋ผ์˜จ ๊ธ€
์ตœ๊ทผ์— ๋‹ฌ๋ฆฐ ๋Œ“๊ธ€
Total
Today
Yesterday
๋งํฌ
ยซ   2024/05   ยป
์ผ ์›” ํ™” ์ˆ˜ ๋ชฉ ๊ธˆ ํ† 
1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31
๊ธ€ ๋ณด๊ด€ํ•จ