Hopper v4 For Linux Crack
去官网看了下发现 Hopper v4 的 Linux 版本也可以下载了,于是下载试用了下。
搜索字符串“Try the Demo”发现函数 ShowLicenseDialog (0x00000000004f9b30)
中存在调用:
00000000004f9d87 mov rbx, qword [r14+0x80] ; CODE XREF=ShowLicenseDialog+557, ShowLicenseDialog+577
00000000004f9d8e lea rsi, qword [_ZTSSt11_Mutex_baseILN9__gnu_cxx12_Lock_policyE2EE+2549] ; "LicenseDialog"
00000000004f9d95 lea rdx, qword [_ZTSSt11_Mutex_baseILN9__gnu_cxx12_Lock_policyE2EE+3179] ; "Try the Demo"
00000000004f9d9c lea r15, qword [rsp+0x50+var_40]
00000000004f9da1 xor ecx, ecx
00000000004f9da3 mov r8d, 0xffffffff
00000000004f9da9 mov rdi, r15
00000000004f9dac call j__ZN16QCoreApplication9translateEPKcS1_S1_i
gdb 调试,在该函数设置断点。启动后触发端点,回溯如下:
Breakpoint * 0x4f9b30
pwndbg> bt
#0 0x00000000004f9b30 in ()
#1 0x00000000004f920c in ()
#2 0x00000000004f46b2 in ()
#3 0x00000000005f5101 in ()
#4 0x00000000005fb35f in ()
#5 0x0000000000549491 in ()
#6 0x00007ffff515b159 in dispatch_main_queue_drain_np () at /opt/hopper-v4/lib/libdispatch.so.1
...
中间几个是 Qt 的相关设置,最后定位到:
00000000005f50e9 call CheckLicense ; CODE XREF=sub_5f5090+20, sub_5f5090+35
00000000005f50ee test al, al
00000000005f50f0 jne loc_5f513c
00000000005f50f2 lea rbx, qword [rsp+0x70+var_70]
00000000005f50f6 mov rdi, rbx ; argument #1 for method sub_4f4670
00000000005f50f9 mov rsi, r15
00000000005f50fc call sub_4f4670
00000000005f5101 mov rax, qword [rsp+0x70+var_70]
00000000005f5105 mov rax, qword [rax+0x1a8]
0x00000000005f50fc 处的调用向上看,发现典型的 test/jne,确定 CheckLicense (0x00000000004f7660)
就是真正的校验函数,patch 如下:
00000000004f7660 mov eax, 0x1 ; CODE XREF=sub_5bd550+1013, sub_5f5090+89, sub_5f5090+129, sub_5f9760+15, sub_5f99a0+8, sub_5f9b00+8, sub_5f9c60+8
00000000004f7665 ret
爆破大法好;)