是否可以“修补”用于复制保护的 .exe?
是否可以使用 C++ 或 C# 创建应用程序,以便我可以修补 exe 文件以实现复制保护目的?
因此,如果用户在我的网站上拥有与其绑定的软件的帐户,我可以要求他们输入一个与数据库检查的密钥,然后执行或显示错误。
当我说“补丁”时,我的意思是应用于已经构建/编译的 exe。感谢您的帮助。 :)
Is it possible to create an app in C++ or C# so I can patch a exe file for copy protection purposes?
So if a user has an account on my website with the software tied to it, I can require them to enter a key which is checked with the database and then execute or show an error.
When I say "patch", I mean applying to an already built/compiled exe. Thanks for the help. :)
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(2)
这很容易实现,许多加壳程序和保护系统(例如Themida)都这样做,但是,这样的事情可以很容易被破解,因此您需要评估某人破解您的程序所需的努力与回报。
但是,要直接回答您的问题,最好的办法是挂钩 PE 中定义的代码入口点并将其重定向到您的检查器(取决于操作系统)。 UPX 是一个开源可执行加壳程序,应该提供良好的使用基础或参考点 asa 它挂钩可执行文件的条目以运行解包引擎。您还可以在此处找到一些有关加壳器和保护器的文章。
Its easily possible, many packers and protection systems like Themida do this, however, things like this can be easily cracked, thus you need to evaluate the effort vs reward required for someone to hack your program.
However, to directly answer your question, your best bet is to hook the code entry point defined in the PE and have it redirect to your checker (OS dependant). UPX is an opensource executable packer, and should provide a good base to use or point of reference asa it hooks the entry of the executable to run the unpacking engine. You can also find a few articles on packers and protectors here.
根据复制保护的复杂程度,“修补”在最简单的情况下可能只是归结为在受保护的 EXE 文件中的选定偏移处写入几个字节。 这个项目可能很有趣。
Depending on how complicated your copy protection is, "patching" may be in the simplest case just boiled down to writing a few bytes at selected offsets in the protected EXE file. This project may be interesting.