home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Reverse Code Engineering RCE CD +sandman 2000
/
ReverseCodeEngineeringRceCdsandman2000.iso
/
RCE
/
E_bliss
/
n0p3x_keyfile.txt
< prev
next >
Wrap
Text File
|
2000-05-25
|
1KB
|
31 lines
Greetings Crackers,
Well here is how I've solved n0p3x's KeyFILE CrackMe ... I can't write a complete tutorial
due time reasons ... I do think you will understand this tut anyway:
1) BPX CreateFileA
=> N0P3X.KEY (Read 0xA bytes)
2) some tracing in SoftICE till you come accross
:00401113 XOR BYTE PTR [EAX+004020F3],43 ; XOR read values with 43h
:0040111A INC EAX ; counter + 1
:0040111B CMP BYTE PTR [EAX+004020F3],00 ; nothing enterd
:00401122 JNZ 00401113 ; if so => invalid keyfile
:00401124 PUSH 004020F3 ; manipulated read data
:00401129 PUSH 004020FD ; good data
:0040112E CALL KERNEL32!lstrcmp ; compare them
:00401133 CMP EAX,00 ; everything ok?
:00401136 JZ 0040113E ; if so => Purchase Msg Box
:00401138 JMP 00401158 ; if not => Unregistered Msg Box
3) so to get Purchase Msg Box we have to find out what our code has to be (00) after
XOR 43h ... and you know XOR variable, variable is 0 ... so the solution is just
CCCCCCCCCC
4) CrackMe solved ... that wasn't hard ... was it?
Post questions regarding this CrackMe at http://disc.server.com/discussion.cgi?id=42092
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
TORN@DO [CF2K leader and ID member]