Добрый вечер. ребят помогите пожалуйста кто-нибудь. Есть инструкция взлома на англ. языке, но не в этом дело, написана профф. языком. А я пользователь хотя и немного продвинутый, но порядок действий , а главное использование какого по, я не знаю. Подскажите пожалуйста кто понимает. Разжуйте последовательность взлома. Заранее благодарен, вот исходный текст взлома HASP... this again is easy to find (set a breakpoint for GetProcAddress and then a bpr for anywhere in the .idata section), here's the code :- :bpr 004c5000 004c5000+250c rw Break due to BPR #0167:004C5000 #0167:004C750C RW :0053C800 MOV EAX,[EBP-0C] <-- VA of import table (4C5000). :0053C803 CMP DWORD PTR [EAX+0C],00 :0053C807 JZ 0053C860 Finally fix the BASRELOC & Size entries in the data directory, 0xCA000 (RVA of .reloc) & B800 (size) in this case. Did I also mention that you should delete the .protect section from the PE header and update the number of sections. Now of course you must crack Cimagrafi's HASP protection in the usual manner . The HASP DLL Cracking Technique I should point out that I'm not the pioneer of this technique and it only really has advantages if you have many files protected by HASP and want to bpx just a single location to examine all of the checks, its also a technique that can be used using just finger movements inside your HEX editor. Included now in the HASP archive (check the Tools page) I've given you a hasp.dll (actually this is a dll HASP provide to developers that has been edited somewhat for our purposes). Please beware that this dll won't always work and when it doesn't your system is likely to be trashed ..... it certainly doesn't work 'as is' with Cimagrafi, the stack needs to be corrected). I won't explain any further how this works (I tested only with MAYA Fusion v2.51b), HASP watchers will figure the rest on their own :- 1. Locate the HASP trademark 'cmp bh, 32' inside your target. 2. Trace below the next CALL. Change the PUSHAD 4 lines into the CALL (i.e. the 2nd instance) into a NOP and note the address ESI is pointing too (2 lines above). 3. Change the CALL to GetModuleHandleA (about 10 lines below) to LoadLibraryA. 4. Locate the next CALL following what was GetModuleHandleA and trace below. The first CALL to GetProcAddress should save EAX to the location of ESI you noted in part 2. The line immediately afterwards should be changed to point ESI at this address. 5. Locate the string 'KERNEL32.DLL' and change to the name of our new dll, be sure to change only the HASP reference (look for HASP names like HASPUT16.DLL nearby). 6. Load your program, bpx for the 'cmp bh, 32' reference, trace and figure, edit the dll to your needs.
Если ты пользователь а не программер на ассемблере то это тебе не взломать, обратись тогда лучше к специалистам они тебе с мануалом взломают в два счёта