您的位置:首页精文荟萃破解文章 → 去除pdf文件“打印”“拷贝”限制

去除pdf文件“打印”“拷贝”限制

时间:2004/10/15 1:03:00来源:本站整理作者:蓝点我要评论(0)

 





 

 








Acrobat Reader 5.1中文版+windows2000 sp0+softice
网上下载的pdf文件经常打开后只能阅读,不能打印、拷贝等功能,前几天幸好有一个这样的文件急需打印,破解过程如下:
1。打开softice;
2。打开Acrobat Reader,打开要阅读的文件;
3。ctrl+d调出softice,下断bpx Enablemenuitem
4。在reader中点击菜单file;
5。F12三次,往回找可以看到以下代码;
:00414E71 55                      push ebp
:00414E72 8BEC                    mov ebp, esp
:00414E74 A130F17400              mov eax, dword ptr [0074F130]
:00414E79 56                      push esi
:00414E7A 8BF1                    mov esi, ecx
:00414E7C 8B8818020000            mov ecx, dword ptr [eax+00000218]
:00414E82 85C9                    test ecx, ecx
:00414E84 741A                    je 00414EA0
:00414E86 FF7514                  push [ebp+14]
:00414E89 8B01                    mov eax, dword ptr [ecx]
:00414E8B FF7510                  push [ebp+10]
:00414E8E FF750C                  push [ebp+0C]
:00414E91 FF7508                  push [ebp+08]6。清除所有断点,然后在此下断,F5执行,可以看到push的内容,其是菜单的id号,执行多次,一直到push 1784(print。。。的ID号)
:00414E94 FF500C                  call [eax+0C]7。进入该调用,将进入如下的程序。
-----------------------------------------------------------------
:00411233 55                      push ebp
:00411234 8BEC                    mov ebp, esp
:00411236 8D4508                  lea eax, dword ptr [ebp+08]
:00411239 56                      push esi
:0041123A 50                      push eax
:0041123B 83C138                  add ecx, 00000038
:0041123E FF7508                  push [ebp+08]
:00411241 E853450000              call 004157998。该程序得到Reader每个菜单的属性表(权且先这么命名)

仔细分析程序415799可以得到Acrobat Reader中很重要的数据结构。Acrobat Reader中将所有的菜单分为11个组,即
MenuGroup *MenuGroupArray[11];针对不同的菜单项具体在哪个组中可以通过ID号来计算。MenuGroupNo=(ID>>4) mod 11;

而MenuGroup是一个链表:
struct MenuGroup{
MenuGroup * PrevMenuGroup;
DWORD MenuGroupNo;
DWORD MenuID;
MenuAttribute * MenuAttrPtr;
}
知道了某个菜单的ID号,最重要的数据是MenuAttrPtr,知道了这个值就可以找到每个菜单项对应的属性以及该菜单对应的执行程序。

:00411246 8BF0                    mov esi, eaxesi=*MenuAttrPtr
:00411248 F7DE                    neg esi
:0041124A 1BF6                    sbb esi, esi
:0041124C 237508                  and esi, dword ptr [ebp+08]
:0041124F 85F6                    test esi, esi
:00411251 7440                    je 00411293
:00411253 57                      push edi
:00411254 8B7D10                  mov edi, dword ptr [ebp+10]
:00411257 85FF                    test edi, edi
:00411259 742B                    je 00411286
:0041125B 53                      push ebx
:0041125C 8B1F                    mov ebx, dword ptr [edi]
:0041125E 56                      push esi;ESI=*MenuAttrPtr
:0041125F E8387A0700              call 00488C9C9。该程序的调用返回结果直接影响下面的EnableMenuItem,跟进去;
:00411264 0FB7C0                  movzx eax, ax
:00411267 59                      pop ecx
:00411268 50                      push eax
:00411269 8BCF                    mov ecx, edi
:0041126B FF13                    call dword ptr [ebx]10。EnableMenuItem在该程序中调用。
:0041126D 8B1F                    mov ebx, dword ptr [edi]
:0041126F 56                      push esi
:00411270 E8C07A0700              call 00488D35
:00411275 66F7D8                  neg ax
:00411278 1BC0                    sbb eax, eax
:0041127A 59                      pop ecx
:0041127B F7D8                    neg eax
:0041127D 50                      push eax
:0041127E 8BCF                    mov ecx, edi
:00411280 FF5304                  call [ebx+04]
:00411283 5B                      pop ebx
:00411284 EB07                    jmp 0041128D
------------------------------------------------------------------
:00488C9C B890C36900              mov eax, 0069C390
:00488CA1 E8DAFDFDFF              call 00468A80;加入SEH例外处理
:00488CA6 83EC18                  sub esp, 00000018
:00488CA9 53                      push ebx
:00488CAA 56                      push esi
:00488CAB 8B7508                  mov esi, dword ptr [ebp+08]
:00488CAE 57                      push edi
:00488CAF 33FF                    xor edi, edi
:00488CB1 8965F0                   push 00000001
:00488CC2 5B                      pop ebx
:00488CC3 895D08                  mov dword ptr [ebp+08], ebx
:00488CC6 7450                    je 00488D18
:00488CC8 57                      push edi
:00488CC9 E8ECE4FFFF              call 004871BA
:00488CCE 6685C0                  test ax, ax
:00488CD1 59                      pop ecx
:00488CD2 7544                    jne 00488D18
:00488CD4 53                      push ebx
:00488CD5 E830E5FFFF              call 0048720A
:00488CDA 59                      pop ecx
:00488CDB 897DFC                  mov dword ptr [ebp-04], edi
:00488CDE E8FF141700              call 005FA1E2
:00488CE3 8945EC                  mov dword ptr [ebp-14], eax
:00488CE6 8B08                    mov ecx, dword ptr [eax]
:00488CE8 894DE4                  mov dword ptr [ebp-1C], ecx
:00488CEB 8D4DE4                  lea ecx, dword ptr [ebp-1C]
:00488CEE 8908                    mov dword ptr [eax], ecx
:00488CF0 C745E8C3A15F00          mov [ebp-18], 005FA1C3
:00488CF7 FF7634                  push [esi+34]
:00488CFA 885DFC                  mov byte ptr [ebp-04], bl
:00488CFD FF5630                  call [esi+30]11.*(*MenuAttrPtr+30)对应不同菜单项的可执行程序,call 49f7c4
------------------------------------------------------------------------------

:0049F7C4 56                      push esi
:0049F7C5 FF742408                push [esp+08]
:0049F7C9 E8B6F4FFFF              call 0049EC84
:0049F7CE 8BF0                    mov esi, eax
:0049F7D0 59                      pop ecx
:0049F7D1 85F6                    test esi, esi
:0049F7D3 7429                    je 0049F7FE
:0049F7D5 6A0A                    push 0000000A
:0049F7D7 6A01                    push 00000001
:0049F759 5B                      push esi
:0049F7DA E8BFEEFDFF              call 0047E69E12.跟进去。
:0049F7DF 83C40C                  add esp, 0000000C
:0049F7E2 6685C0                  test ax, ax
:0049F7E5 7512                    jne 0049F7F9
:0049F7E7 6A0B                    push 0000000B
:0049F7E9 6A01                    push 00000001
:0049F7EB 56                      push esi
:0049F7EC E8ADEEFDFF              call 0047E69E
:0049F7F1 83C40C                  add esp, 0000000C
:0049F7F4 6685C0                  test ax, ax
:0049F7F7 7405                    je 0049F7FE
--------------------------------------------------------------------
:0047E69E 53                      push ebx
:0047E69F 8B5C2410                mov ebx, dword ptr [esp+10];0A
:0047E6A3 56                      push esi
:0047E6A4 8B74240C                mov esi, dword ptr [esp+0C];*MenuAttrPtr
:0047E6A8 57                      push edi
:0047E6A9 8B7C2414                mov edi, dword ptr [esp+14];01
:0047E6AD 83FF01                  cmp edi, 00000001
:0047E6B0 7523                    jne 0047E6D5
:0047E6B2 83FB13                  cmp ebx, 00000013
:0047E6B5 751E                    jne 0047E6D513.跳转
:0047E6B7 85F6                    test esi, esi
:0047E6B9 7504                    jne 0047E6BF
:0047E6BB 33C0                    xor eax, eax
:0047E6BD EB03                    jmp 0047E6C2

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0047E6B9(C)
|
:0047E6BF 8B4650                  mov eax, dword ptr [esi+50]

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0047E6BD(U)
|
:0047E6C2 50                      push eax
:0047E6C3 E884CF0600              call 004EB64C
:0047E6C8 50                      push eax
:0047E6C9 E8984E0900              call 00513566
:0047E6CE 59                      pop ecx
:0047E6CF 6685C0                  test ax, ax
:0047E6D2 59                      pop ecx
:0047E6D3 7463                    je 0047E738

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:0047E6B0(C), :0047E6B5(C)
|
:0047E6D5 56                      push esi;esi=*MenuAttrPtr
:0047E6D6 E874FFFFFF              call 0047E64F
:0047E6DB 6685C0                  test ax, ax
:0047E6DE 59                      pop ecx
:0047E6DF 7429                    je 0047E70A;跳转
:0047E6E1 83FF01                  cmp edi, 00000001
:0047E6E4 7415                    je 0047E6FB
:0047E6E6 83FF02                  cmp edi, 00000002
:0047E6E9 7409                    je 0047E6F4
:0047E6EB 761D                    jbe 0047E70A
:0047E6ED 83FF08                  cmp edi, 00000008
:0047E6F0 7718                    ja 0047E70A
:0047E6F2 EB44                    jmp 0047E738

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0047E6E9(C)
|
:0047E6F4 83FB05                  cmp ebx, 00000005
:0047E6F7 7411                    je 0047E70A
:0047E6F9 EB3D                    jmp 0047E738

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0047E6E4(C)
|
:0047E6FB 83FB04                  cmp ebx, 00000004
:0047E6FE 7438                    je 0047E738
:0047E700 83FB14                  cmp ebx, 00000014
:0047E703 7433                    je 0047E738
:0047E705 83FB09                  cmp ebx, 00000009
:0047E708 742E                    je 0047E738

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:0047E6DF(C), :0047E6EB(C), :0047E6F0(C), :0047E6F7(C)
|
:0047E70A 8D4610                  lea eax, dword ptr [esi+10];MenuAttrPtr+10
:0047E70D 85C0                    test eax, eax
:0047E70F 742C                    je 0047E73D
:0047E711 8B08                    mov ecx, dword ptr [eax]
:0047E713 83F938                  cmp ecx, 00000038
:0047E716 7625                    jbe 0047E73D;跳转
:0047E718 6683783800              cmp word ptr [eax+38], 0000
:0047E71D 741E                    je 0047E73D
:0047E71F 83F93C                  cmp ecx, 0000003C
:0047E722 7619                    jbe 0047E73D
:0047E724 8B403C                  mov eax, dword ptr [eax+3C]
:0047E727 85C0                    test eax, eax
:0047E729 7412                    je 0047E73D
:0047E72B 53                      push ebx
:0047E72C 57                      push edi
:0047E72D 56                      push esi
:0047E72E FFD0                    call eax
:0047E730 83C40C                  add esp, 0000000C
:0047E733 6685C0                  test ax, ax
:0047E736 7405                    je 0047E73D

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:0047E6D3(C), :0047E6F2(U), :0047E6F9(U), :0047E6FE(C), :0047E703(C)
|:0047E708(C)
|
:0047E738 6633C0                  xor ax, ax
:0047E73B EB1E                    jmp 0047E75B

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:0047E70F(C), :0047E716(C), :0047E71D(C), :0047E722(C), :0047E729(C)
|:0047E736(C)
|
:0047E73D 85F6                    test esi, esi
:0047E73F 7504                    jne 0047E745;跳转
:0047E741 33C0                    xor eax, eax
:0047E743 EB03                    jmp 0047E748

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0047E73F(C)
|
:0047E745 8B4650                  mov eax, dword ptr [esi+50]

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0047E743(U)
|
:0047E748 6A00                    push 00000000
:0047E74A 53                      push ebx
:0047E74B 57                      push edi
:0047E74C 50                      push eax
:0047E74D E842EB0A00              call 0052D294;14。跟进此程序
:0047E752 83C410                  add esp, 00000010

:0052D294 55                      push ebp
:0052D295 8BEC                    mov ebp, esp
:0052D297 53                      push ebx
:0052D298 56                      push esi
:0052D299 57                      push edi
:0052D29A 8B7D08                  mov edi, dword ptr [ebp+08];*MenuAttrPtr
:0052D29D 85FF                    test edi, edi
:0052D29F 7508                    jne 0052D2A9

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0052D3DB(C)
|
:0052D2A1 6633C0                  xor ax, ax
:0052D2A4 E943010000              jmp 0052D3EC

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0052D29F(C)
|
:0052D2A9 8B4770                  mov eax, dword ptr [edi+70];15。菜单的属性,如果可以打印此处将是0。
:0052D2AC 85C0                    test eax, eax
:0052D2AE 7405                    je 0052D2B5
:0052D2B0 8B5808                  mov ebx, dword ptr [eax+08]
:0052D2B3 EB02                    jmp 0052D2B7

修改程序,ultraedit打开程序acro32。exe,查找8B477085C074058B5808,将8B4770改成33c090,(xor EAX,EAX;NOP;)
存盘,退出。
运行改过的ACRO32.EXE
打开有打印限制的文件,此时打印菜单已经可以点击。在文本中选择,右键点击,可以看到“复制、全选”都可用。
时间关系写的简单,凑合看。

    
    
     
    
    
     

相关阅读 Windows错误代码大全 Windows错误代码查询激活windows有什么用Mac QQ和Windows QQ聊天记录怎么合并 Mac QQ和Windows QQ聊天记录Windows 10自动更新怎么关闭 如何关闭Windows 10自动更新windows 10 rs4快速预览版17017下载错误问题Win10秋季创意者更新16291更新了什么 win10 16291更新内容windows10秋季创意者更新时间 windows10秋季创意者更新内容kb3150513补丁更新了什么 Windows 10补丁kb3150513是什么

文章评论
发表评论

热门文章 去除winrar注册框方法

最新文章 比特币病毒怎么破解 比去除winrar注册框方法 华为无线路由器HG522-C破解教程(附超级密码JEB格式文件京东电子书下载和阅读限制破解教UltraISO注册码全集(最新)通过Access破解MSSQL获得数据

人气排行 华为无线路由器HG522-C破解教程(附超级密码JEB格式文件京东电子书下载和阅读限制破解教UltraISO注册码全集(最新)qq相册密码破解方法去除winrar注册框方法(适应任何版本)怎么用手机破解收费游戏华为无线猫HG522破解如何给软件脱壳基础教程