如何破解supplicant3.6.4
- 提问者网友:回忆在搜索
- 2021-04-13 05:52
网速奇卡无比
每天晚上11点50还断网
求高人破解一下
以求提高网速
如果可以的话连上网时间限制也破解下
有劳了
如果有人可以成功破解的话
再加300分
- 五星知识达人网友:渊鱼
- 2021-04-13 06:31
- 1楼网友:大漠
- 2021-04-13 07:54
终于破解了,小蝴蝶用的是aspack2.12的壳。首先用aspack2.12脱壳机脱壳。脱壳后用ollydbg静态调试,去除多网卡限制。(ollydbg可在pediy.com上下载)ollydbg载入后点右键ultra string reference---find ASCII。(汉化的是超级字串参考)按ctrl+f,查找“网卡”。定位到“您启用了多块物理网卡,被强制下线”
双击,到反汇编界面。向上边找00404B9D . 0F87 2F030000 ja 00404ED2处。双击修改为
jmp 00404ED2
点右键复制到可执行文件---选择。然后点右键选保存文件,重命名。搞定
00404B90 . 8B4424 08 mov eax, dword ptr [e> 00404B94 . 56 push esi 00404B95 . 83C0 F9 add eax, -7 ; Switch (cases 7..17) 00404B98 . 8BF1 mov esi, ecx 00404B9A . 83F8 10 cmp eax, 10 00404B9D . 0F87 2F030000 ja 00404ED2 修改为jmp 00404ED2 00404BA3 . 33C9 xor ecx, ecx 00404BA5 . 8A88 004F4000 mov cl, byte ptr [eax> 00404BAB . FF248D D84E40>jmp dword ptr [ecx*4+> 00404BB2 > 8BCE mov ecx, esi ; Case 16 of switch 00404B95 00404BB4 . E8 372B0000 call 004076F0 00404BB9 . A0 F48C4500 mov al, byte ptr [458> 00404BBE . 6A 10 push 10 00404BC0 . 84C0 test al, al 00404BC2 . 74 28 je short 00404BEC 00404BC4 . 8B15 D4104500 mov edx, dword ptr [4>; _UnPacke.004510DC 00404BCA . 8BCE mov ecx, esi 00404BCC . 52 push edx 00404BCD . 68 B0214500 push 004521B0 00404BD2 . E8 7E160300 call 00436255 00404BD7 . 68 B0214500 push 004521B0 00404BDC . 6A 01 push 1 00404BDE . B9 B88C4500 mov ecx, 00458CB8 00404BE3 . E8 58D80000 call 00412440 00404BE8 . 5E pop esi 00404BE9 . C2 0800 retn 8 00404BEC > A1 D4104500 mov eax, dword ptr [4> 00404BF1 . 8BCE mov ecx, esi 00404BF3 . 50 push eax 00404BF4 . 68 88214500 push 00452188 00404BF9 . E8 57160300 call 00436255 00404BFE . 68 88214500 push 00452188 00404C03 . 6A 01 push 1 00404C05 . B9 B88C4500 mov ecx, 00458CB8 00404C0A . E8 31D80000 call 00412440 00404C0F . 5E pop esi 00404C10 . C2 0800 retn 8 00404C13 > 8BCE mov ecx, esi ; Case 7 of switch 00404B95 00404C15 . E8 D62A0000 call 004076F0 00404C1A . 5E pop esi 00404C1B . C2 0800 retn 8 00404C1E > 8BCE mov ecx, esi ; Case 17 of switch 00404B95 00404C20 . E8 CB2A0000 call 004076F0 00404C25 . A0 F48C4500 mov al, byte ptr [458> 00404C2A . 6A 10 push 10 00404C2C . 84C0 test al, al 00404C2E . 74 28 je short 00404C58 00404C30 . 8B0D D4104500 mov ecx, dword ptr [4>; _UnPacke.004510DC 00404C36 . 51 push ecx 00404C37 . 68 5C214500 push 0045215C 00404C3C . 8BCE mov ecx, esi 00404C3E . E8 12160300 call 00436255 00404C43 . 68 5C214500 push 0045215C 00404C48 . 6A 01 push 1 00404C4A . B9 B88C4500 mov ecx, 00458CB8 00404C4F . E8 ECD70000 call 00412440 00404C54 . 5E pop esi 00404C55 . C2 0800 retn 8 00404C58 > 8B15 D4104500 mov edx, dword ptr [4>; _UnPacke.004510DC 00404C5E . 8BCE mov ecx, esi 00404C60 . 52 push edx 00404C61 . 68 30214500 push 00452130 00404C66 . E8 EA150300 call 00436255 00404C6B . 68 30214500 push 00452130 00404C70 . 6A 01 push 1 00404C72 . B9 B88C4500 mov ecx, 00458CB8 00404C77 . E8 C4D70000 call 00412440 00404C7C . 5E pop esi 00404C7D . C2 0800 retn 8 00404C80 > 8BCE mov ecx, esi ; Case 8 of switch 00404B95 00404C82 . E8 692A0000 call 004076F0 00404C87 . A0 F48C4500 mov al, byte ptr [458> 00404C8C . 6A 10 push 10 00404C8E . 84C0 test al, al 00404C90 . 74 27 je short 00404CB9 00404C92 . A1 D4104500 mov eax, dword ptr [4> 00404C97 . 8BCE mov ecx, esi 00404C99 . 50 push eax 00404C9A . 68 04214500 push 00452104 00404C9F . E8 B1150300 call 00436255 00404CA4 . 68 04214500 push 00452104 00404CA9 . 6A 01 push 1 00404CAB . B9 B88C4500 mov ecx, 00458CB8 00404CB0 . E8 8BD70000 call 00412440 00404CB5 . 5E pop esi 00404CB6 . C2 0800 retn 8 00404CB9 > 8B0D D4104500 mov ecx, dword ptr [4>; _UnPacke.004510DC 00404CBF . 51 push ecx 00404CC0 . 68 E0204500 push 004520E0 ; 您启用了多块物理网卡,被强制下线! 00404CC5 . 8BCE mov ecx, esi 00404CC7 . E8 89150300 call 00436255 00404CCC . 68 E0204500 push 004520E0 ; 您启用了多块物理网卡,被强制下线! 00404CD1 . 6A 01 push 1 00404CD3 . B9 B88C4500 mov ecx, 00458CB8 00404CD8 . E8 63D70000 call 00412440 00404CDD . 5E pop esi