发布网友
共3个回答
热心网友
StarForce 加密小窥
starforce保护文件的名称 prosync1.sys
这个文件属性如下:
该文件的说明
StarForce Protection Synchronization Driver
产品版本
version 3.3
StarForce Protection System
.text:000103E5 ; 哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪?
.text:000103E8 align 10h
.text:000103F0 aScsiportinitia db 'ScsiPortInitialize',0 ; DATA XREF: sub_10411+A4o
.text:00010403 align 4
.text:00010404 aNtoskrnl_exe db 'ntoskrnl.exe',0 ; DATA XREF: sub_10411+E4o
.text:00010411
.text:00010411 ; 圹圹圹圹圹圹圹?S U B R O U T I N E 圹圹圹圹圹圹圹圹圹圹圹圹圹圹圹圹圹圹圹?
.text:00010411
.text:00010411
.text:00010411 sub_10411 proc near ; CODE XREF: start+85p
.text:00010411 push esi
.text:00010412 push 0
.text:00010414 push 656E6F4Eh
.text:00010419 push 10h
.text:0001041B push 0
.text:0001041D push 0
.text:0001041F push 0
.text:00010421 push offset unk_111B0
.text:00010426 call sub_10340
.text:0001042B push 0
.text:0001042D push 656E6F4Eh
.text:00010432 push 0Ch
.text:00010434 push 0
.text:00010436 push 0
.text:00010438 push 0
.text:0001043A push offset unk_11238
.text:0001043F call sub_10340
.text:00010444 push offset unk_111A4
.text:00010449 call ds:KeInitializeSpinLock
.text:0001044F push 2Ch
.text:00010451 push 0
.text:00010453 push offset dword_1120C
.text:00010458 call memset
.text:0001045D add esp, 0Ch
.text:00010460 mov byte_11200, 0
.text:00010467 mov eax, offset dword_11288
.text:0001046C mov dword_1128C, eax
.text:00010471 mov dword_11288, eax
.text:00010476 mov dword_11208, 0
.text:00010480 call sub_10871
.text:00010485 mov esi, eax
.text:00010487 test esi, esi
.text:000104 jz short loc_104A5
.text:0001048B push edi
.text:0001048C mov edi, ds:ExDeleteNPagedLookasideList
.text:00010492 push offset unk_11238
.text:00010497 call edi ; ExDeleteNPagedLookasideList
.text:00010499 push offset unk_111B0
.text:0001049E call edi ; ExDeleteNPagedLookasideList
.text:000104A0 mov eax, esi
.text:000104A2 pop edi
.text:000104A3 pop esi
.text:000104A4 retn
.text:000104A5 ; 哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪?
.text:000104A5
.text:000104A5 loc_104A5: ; CODE XREF: sub_10411+78j
.text:000104A5 push offset loc_11100
.text:000104AA call sub_10ABA
.text:000104AF push eax
.text:000104B0 call sub_10ACA
.text:000104B5 push offset aScsiportinitia ; "ScsiPortInitialize"
.text:000104BA push eax
.text:000104BB mov dword_111A0, eax
.text:000104C0 call sub_10AFA//这里是hook "ScsiPortInitialize",
.text:000104C5 push 0
.text:000104C7 push 0
.text:000104C9 push 0
.text:000104CB push 0
.text:000104CD mov dword_111A8, eax
.text:000104D2 call PsGetVersion
.text:000104D7 test al, al
.text:000104D9 jz short loc_10500
.text:000104DB push offset loc_110EE
.text:000104E0 call sub_10ABA
.text:000104E5 push offset nullsub_1
.text:000104EA mov dword_11204, eax
.text:000104EF push eax
.text:000104F0 mov eax, dword_111A0
.text:000104F5 push offset aNtoskrnl_exe ; "ntoskrnl.exe"
.text:000104FA push eax
.text:000104FB call sub_10C0A
.text:00010500
.text:00010500 loc_10500: ; CODE XREF: sub_10411+C8j
.text:00010500 mov ecx, dword_111A8
.text:00010506 mov edx, dword_111A0
.text:0001050C push offset sub_10531//hook "ScsiPortInitialize"的程序的位置,以后程序调用ScsiPortInitialize就先进starfoce的sub_10531
.text:00010511 push ecx
.text:00010512 push edx
.text:00010513 call sub_10BAA
.text:00010518 xor eax, eax
.text:0001051A pop esi
.text:0001051B retn
.text:0001051B sub_10411 endp ; sp = -10h
.text:0001051B
.text:0001051B ; 哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪?
.text:0001051C dd 90909090h
.text:00010520 db 90h
.text:00010521 ; [00000003 BYTES: COLLAPSED FUNCTION nullsub_1. PRESS KEYPAD "+" TO EXPAND]
.text:00010524 dd 3 p(90909090h)
.text:00010530 db 90h
.text:00010531
////////////////////////////////////////////////////////////////////////////////////////////////////////////
///由于prosync1.sys以后只要有ScsiPortInitialize调用StarForce 就先接管进这下边的程序。你是虚拟光驱就难逃法眼。
///Starforce可以在你虚拟光区驱动起来之前,这里先去探测你的scsi卡的寄存器。当你有IDE光驱连接的时候,StarForce
如果探测寄存器失败。这下就可以判断出你是虚拟光驱了。叫你换盘插入。嘿嘿,你只有拔掉IDE光驱线骗StarForce,StarForce
//拔掉IDE光驱线后由于探测不到寄存器所以不敢错杀一千,可以让虚拟光驱通过这万里检查的第一步。后边的DPM的检测才是
//真正利害的!
.text:00010531 ; 圹圹圹圹圹圹圹?S U B R O U T I N E 圹圹圹圹圹圹圹圹圹圹圹圹圹圹圹圹圹圹圹?
.text:00010531
.text:00010531
.text:00010531 sub_10531 proc near ; DATA XREF: sub_10411+FBo
.text:00010531
.text:00010531 arg_0 = dword ptr 10h
.text:00010531 arg_4 = dword ptr 14h
.text:00010531 arg_8 = dword ptr 18h
.text:00010531 arg_C = dword ptr 1Ch
.text:00010531
.text:00010531 push ebp
.text:00010532 push esi
.text:00010533 push edi
.text:00010534 push offset unk_111B0
.text:00010539 call sub_10370
.text:0001053E mov edi, eax
.text:00010540 test edi, edi
.text:00010542 jnz short loc_1054F
.text:00010544 pop edi
.text:00010545 pop esi
.text:00010546 mov eax, 0C000009Ah
.text:0001054B pop ebp
.text:0001054C retn 10h
.text:0001054F ; 哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪?
.text:0001054F
.text:0001054F loc_1054F: ; CODE XREF: sub_10531+11j
.text:0001054F mov eax, [esp+arg_C]
.text:00010553 mov ecx, [esp+arg_8]
.text:00010557 mov edx, [esp+arg_4]
.text:0001055B mov esi, [esp+arg_0]
.text:0001055F push eax
.text:00010560 push ecx
.text:00010561 push edx
.text:00010562 push esi
.text:00010563 call dword_111A8
.text:00010569 mov ebp, eax
.text:0001056B and eax, 0C0000000h
.text:00010570 cmp eax, 0C0000000h
.text:00010575 jnz short loc_1058A
.text:00010577 push edi
.text:00010578 push offset unk_111B0
.text:0001057D call sub_103B0
.text:00010582 pop edi
.text:00010583 mov eax, ebp
.text:00010585 pop esi
.text:00010586 pop ebp
.text:00010587 retn 10h
.text:0001058A ; 哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪?
.text:0001058A
.text:0001058A loc_1058A: ; CODE XREF: sub_10531+44j
.text:0001058A push ebx
.text:0001058B mov ecx, offset unk_111A4
.text:00010590 call ds:KfAcquireSpinLock
.text:00010596 push esi
.text:00010597 mov bl, al
.text:00010599 call sub_10631
.text:0001059E test eax, eax
.text:000105A0 jnz short loc_105CB
.text:000105A2 mov eax, [esi+34h]
.text:000105A5 mov ecx, [esi+74h]
.text:000105A8 test eax, eax
.text:000105AA mov [edi+4], esi
.text:000105AD mov [edi+8], ecx
.text:000105B0 mov [edi+0Ch], eax
.text:000105B3 mov dword ptr [esi+74h], offset sub_10661
.text:000105BA jz short loc_105C3
.text:000105BC mov dword ptr [esi+34h], offset sub_107E1
.text:000105C3
.text:000105C3 loc_105C3: ; CODE XREF: sub_10531+j
.text:000105C3 push edi
.text:000105C4 call sub_105F1
.text:000105C9 jmp short loc_105D6
.text:000105CB ; 哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪?
.text:000105CB
.text:000105CB loc_105CB: ; CODE XREF: sub_10531+6Fj
.text:000105CB push edi
.text:000105CC push offset unk_111B0
.text:000105D1 call sub_103B0
.text:000105D6
.text:000105D6 loc_105D6: ; CODE XREF: sub_10531+98j
.text:000105D6 mov dl, bl
.text:000105D8 mov ecx, offset unk_111A4
.text:000105DD call ds:KfReleaseSpinLock
.text:000105E3 pop ebx
.text:000105E4 pop edi
.text:000105E5 mov eax, ebp
.text:000105E7 pop esi
.text:000105E8 pop ebp
.text:000105E9 retn 10h
.text:000105E9 sub_10531 endp
.text:000105E9
.text:000105E9 ; 哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪?
.text:000105EC dd 90909090h
.text:000105F0 db 90h
.text:000105F1
.text:000105F1 ; 圹圹圹圹圹圹圹?S U B R O U T I N E 圹圹圹圹圹圹圹圹圹圹圹圹圹圹圹圹圹圹圹?
.text:000105F1
/////////////////////////////////////////////////////////////////////////////////////////////////////////////////
//你也许会说了ScsiPortInitialize()这个函数这样重要吗?嘿嘿,对了。ScsiPortInitialize是虚拟光驱的第一口呼吸。
//StarForce hook该函数的目的就是想把虚拟光驱扼杀哭出第一声来之前,真是太惨了。连摇篮都不愿意给虚拟光驱准备。偶
//一直也不知道ScsiPortInitialize的内幕,最近不是M$的NT4 -SRC泄露出来了吗?嘿嘿以下函数就是在NT4 -SRC中带的这个函数
//的细节有兴趣的朋友可以去看看
/*++
Copyright (c) 1990 Microsoft Corporation
Mole Name:
port.c
Abstract:
This is the NT SCSI port driver. This file contains the initialization
code.
Authors:
Mike Glass
Jeff Havens
Environment:
kernel mode only
Notes:
This mole is a driver dll for scsi miniports.
Revision History:
ULONG
ScsiPortInitialize(
IN PVOID Argument1,
IN PVOID Argument2,
IN PHW_INITIALIZATION_DATA HwInitializationData,
IN PVOID HwContext OPTIONAL
)
/*++
Routine Description:
This routine initializes the port driver.
Arguments:
Argument1 - Pointer to driver object created by system
HwInitializationData - Miniport initialization structure
HwContext - Value passed to miniport driver's config routine
Return Value:
The function value is the final status from the initialization operation.
--*/
{
PDRIVER_OBJECT driverObject = Argument1;
ULONG slotNumber = 0;
ULONG functionNumber = 0;
PDEVICE_EXTENSION deviceExtension = NULL;
NTSTATUS returnStatus = STATUS_DEVICE_DOES_NOT_EXIST;
NTSTATUS status;
//不过对付这东西没办法了吗?现在不是有starFuck了吗?名字取的不错,问我,我也不知道其是啥原理,因为我没用过,但
//我想可以通过这样的方法躲过这个检查,就是在starfoce prosync1.sys驱动起来之前建立一个驱动,让它成为“虚拟光驱的
//虚拟光驱”。当prosync1.sys在hook 处理ScsiPortInitialize()的时候返回一些端口数据来骗starforce ,不过daemon-tools
//和alcochol好象没这样处理。谁知道呢?daemon 的DPM数据精度探测处理骗过starforce非常利害。
//偶发这个帖子只是想抛专引玉StarFOrce 在驱动中就有5-6个拦路虎,望各位大大多多给予指正。
//其中处理虚拟光驱的一点点,
热心网友
StarForce 主要用于正版光盘的加密,如果是正版光盘玩的话,才会用到这个东西,如果是下载的游戏,只要下载一个免CD破解补丁,直接就绕过StarForce。可以到游侠网上去搜一下。
游侠网:http://www.ali213.net
热心网友
如果你想保留STARFORCE,你可以使这个文件在XP模式下运行,方法:对这个文件右建属性,兼容性为XP模式.如果不想要你可以下载VISTA 优化大师,上面有开机自动运行程序的列表,你将STARFORCE改为禁止就好了!
希望能帮上你的忙!-------------- harmile