¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡ OkStart Cracking Tutorials No . 10 Á¦Æ®¿Àµð¿À Version 4.0 Beta 1 ÆÐÄ¡Çϱâ Soft-Ice Version 3.24 , W32Dasm Version 8.93 ProcDump32 - PE unpacker / decryptor Version 1.1 build 11/03/98 ¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡ Á¦Æ®¿Àµð¿À´Â WWPack32 ·Î ½ÇÇà¾ÐÃàµÇ¾î ÀÖ½À´Ï´Ù.. ÀÌ ¾ÐÃàµÈ °ÍÀ» ¾Ë ¼ö ÀÖ´Â ¹æ¹ýÀº HEXA Edit ³ª Mdir ÀÇ VV ·Î ½ÇÇàÆÄÀÏÀ» Àо¸é óÀ½ ºÎºÐ¿¡ ¾ÐÃàµÈ ÇÁ·Î±×·¥ÀÇ ¾àÀÚ°¡ ¾²¿©Àú ÀÖ½À´Ï´Ù.. Àú´Â ÀÌ ¹æ¹ýÀ» »ç¿ëÇϱ⠶§¹®¿¡.. ´Ù¸¥ ¹æ¹ýÀº Àß ¸ð¸£°Ú±º¿ä,.. ÀÌ Á¦Æ® ¿Àµð¿À´Â WWP32 ¶ó°í ¾²¿© ÀÖ½À´Ï´Ù.. ã¾Æ º¸½Ã±â ¹Ù¶ø´Ï´Ù. ½ÇÇàÆÄÀÏÀÌ ¾ÐÃàµÇ¾î ÀÖ´Â »óȲ¿¡¼­.. Æ®·£½ÌÀ» ÇÏ¿© ÆÐÄ¡ ÇÒ °÷À» ãÀ» ¼ö ÀÖ½À´Ï´Ù ±×·¯³ª HEXA Code ¸¦ ½ÇÇàÆÄÀÏ ³»¿¡¼­ ãÀ» ¼ö°¡ ¾øÀ» °Í ÀÔ´Ï´Ù.. ±×·²¶§´Â ½ÇÇà¾ÐÃàÀ» Ǫ½Ã°í HEXA Code ¸¦ ãÀ¸¼Å¾ß ÇÒ °Í ÀÔ´Ï´Ù.. µµ½º ½ÃÀý¿¡´Â UPC ¶ó´Â ÇÁ·Î±×·¥À¸·Î ½ÇÇà¾ÐÃàÀ» Ǫ¼ÌÀ» °ÍÀÔ´Ï´Ù.. Mdir ÀÇ MSET.EXE ÆÄÀÏÀÌ ±× ¿¹ ÀÔ´Ï´Ù.. WWPack32 ¶ó´Â ÇÁ·Î±×·¥ÀÌ ³ª¿Í°¡Áö°í.. 32ºñÆ® ½ÇÇàÆÄÀÏ¿¡µµ ½ÇÇà¾ÐÃàÀ» ÇÒ ¼ö ÀÖ°Ô µÇ¾î Âü »ç¶÷ Â¥Áõ³ª°Ô Çߴµ¥. ProcDump32 ¶ó´Â ÇÁ·Î±×·¥ÀÌ ³ª¿Í¼­ ÀÌ·± ÇÁ·Î±×·¥¶Ç ÇÑ °£´ÜÇÏ°Ô ÆÐÄ¡ ÇÒ ¼ö ÀÖ°Ô µÇ¾ú½À´Ï´Ù.. ¸ÕÀú ProcDump32 ¸¦ ½ÇÇà½ÃŰ½Ê½Ã¿À! ±×·±´ÙÀ½ Unpack ¹öưÀ» ½ÇÇà½ÃŰ½Ê½Ã¿À! ´ÙÀ½À¸·Î Wwpack32 II ¸¦ ¼±ÅÃÇϽʽÿÀ. ±×·±´ÙÀ½ ¾ÐÃàÀ» Ç® ½ÇÇàÆÄÀÏÀ» ¼±ÅÃÇÏ°í ½Ç Çà½ÃŰ°í³ª¸é. Á¶±Ý À̵û°¡.. Save File ¸¦ ÀÔ·ÂÇ϶ó°í ³ª¿É´Ï´Ù.. ¾Æ¹« À̸§À̳ª ÀÔ ·ÂÇÏ¸é ±× ÆÄÀÏ·Î ½ÇÇà¾ÐÃàÀ» Ǭ ÆÄÀÏÀ» ÀúÀåÇÏ°Ô µË´Ï´Ù.. ±×·³.. ½ÇÇà¾ÐÃàÀ» Ǭ ÆÄÀÏÀ» Æ®·£½Ì ÇսôÙ.. Á¦Æ® ¿Àµð¿À¸¦ ½ÇÇà½ÃŰ¸é ´ÙÀ̾ó·Î±× ¹Ú½º°¡ ³ªÅ¸³ª°Ô µË´Ï´Ù.. ÀÌ ¹Ú½º¸¦ Àâ´Â API ÇÕ¼ö´Â CreateDialogInDrectParamA ÇÔ¼ö ÀÔ´Ï´Ù. Á¦Æ®¿Àµð¿À¸¦ ½ÇÇà½Ã۱â Àü¿¡ À§ÀÇ ÇÔ¼ö¿¡ ºêÆ÷¸¦ °É°í ½ÇÇà½ÃŰ½Ê½Ã¿À ´ÙÀ½Àº ¾Æ·¡ÀÇ Äڵ带 º¸½Ã±â ¹Ù¶ø´Ï´Ù. :00479AFE C745FC00000000 mov [ebp-04], 00000000 :00479B05 FF75EC push [ebp-14] :00479B08 E80A0E0000 call 0047A917 :00479B0D 56 push esi :00479B0E FF75E8 push [ebp-18] :00479B11 E8AB080000 call 0047A3C1 :00479B16 50 push eax :00479B17 FF75E4 push [ebp-1C] :00479B1A 8B4DEC mov ecx, dword ptr [ebp-14] :00479B1D E8D1FBFFFF call 004796F3 -> ºêÆ÷ °É¸°°÷.!!!! :00479B22 85C0 test eax, eax :00479B24 7444 je 00479B6A -> jmp 00479B6A ·Î ¹Ù²ã¿ä! -> ÀÌ ºÎºÐÀ» Jump ½ÃÄÑ ¹ö¸®¸é... ¾Æ·¡ÀÇ ½¦¾îÆÇ ·Î°í¸¦ º¼ ¼ö ¾ø°Ô µÇÁÒ!! :00479B26 8B45EC mov eax, dword ptr [ebp-14] :00479B29 F6402410 test [eax+24], 10 :00479B2D 7422 je 00479B51 :00479B2F C745DC04000000 mov [ebp-24], 00000004 :00479B36 8BC8 mov ecx, eax :00479B38 E8F3360000 call 0047D230 :00479B3D F6C401 test ah, 01 :00479B40 7404 je 00479B46 :00479B42 804DDC01 or byte ptr [ebp-24], 01 :00479B46 FF75DC push [ebp-24] :00479B49 8B4DEC mov ecx, dword ptr [ebp-14] :00479B4C E891320000 call 0047CDE2 -> ´ÙÀ̾ó·Î±× ¹Ú½º.. :00479B51 8B4DEC mov ecx, dword ptr [ebp-14] :00479B54 33C0 xor eax, eax :00479B56 39411C cmp dword ptr [ecx+1C], eax :00479B59 740F je 00479B6A À¸À½.. Â¥Áõ³ª°Ô. ³Ñ °£´ÜÇÏÁö¿ä.. ±×·³ À§ÀÇ Äڵ带 ½ÇÇà¾ÐÃàÀ» Ǭ ÆÄÀÏ¿¡¼­ ã¾Æ º¸½Ã±â ¹Ù¶ø´Ï´Ù. ±×·³ ±× Äڵ尡 ¹ß°ßµÇ°Ô µÉ °Í ÀÔ´Ï´Ù.. ½ÇÇà¾ÐÃàÀ» Ç®¸é °£´ÜÇÏ°Ô ÆÐÄ¡ µÇ´Âµ¥.. À½.. ÂÁ.. ±¦È÷ ½ÇÇà¾ÐÃàÀÌ µÇ¾î À־ »ç ¶÷À» Â¥Áõ³ª°Ô Çϱ¸ ÀÖ¾î... À̹ø¿¡ ³ª¿Â.. ¹öÀüÀº 4.01 Àº ½ÇÇà¾ÐÃàÀÌ µÇ¾î ÀÖÁö ¾Ê´õ±º¿ä.. À½.. ¿ÖÀÌ·¯Áö??? ³¡.