美文网首页
Dabarti_Capture吐血折腾2

Dabarti_Capture吐血折腾2

作者: 皿卜土 | 来源:发表于2019-04-03 15:47 被阅读0次

    pexpect在windows上各种问题啊。
    child = pexpect.popen_spawn.PopenSpawn("c:/windows/system32/cmd")

    import subprocess
    path = r'd:\info2.txt'
    output = subprocess.check_output(['type', path], shell=True)
    print output

    python pyinstxtractor.py xx.exe
    uncompyle6 -o . *.pyc
    居然破解了
    message 通过get_hdd_serials产生

    from cryptography.fernet import Fernet
    
    key = 'Iae0hfmZ6rv4uG7wwcSF6-Mf_30M1R-qrmc6xEwMtdg='
    def get_hdd_serials():
        c = wmi.WMI()
        HDDs = [[x.SerialNumber] for x in c.Win32_PhysicalMedia()]
        return HDDs
    message = "        15160F49F48B".encode()
    
    f = Fernet(key)
    encrypted = f.encrypt(message)
    decrypted = f.decrypt(encrypted)
    print(encrypted)
    

    json格式如下

    {
        "Activation Keys": [
                "xxxx"
        ],
        "License Key": ""
    }
    

    相关文章

      网友评论

          本文标题:Dabarti_Capture吐血折腾2

          本文链接:https://www.haomeiwen.com/subject/ksszbqtx.html