home *** CD-ROM | disk | FTP | other *** search
/ Reverse Code Engineering RCE CD +sandman 2000 / ReverseCodeEngineeringRceCdsandman2000.iso / RCE / E_bliss / phox_crackme1.txt < prev    next >
Text File  |  2000-05-25  |  850b  |  22 lines

  1. PhoX's NAG removal CrackMe
  2. --------------------------
  3.  
  4. Ok, thisone is sOO easy.. :)
  5. well all you really need to do is to set a breakpoint on MessageBoxA
  6. and start the crackme, then you'll land here:
  7.  
  8. :0040101E  E8DA010000          CALL    USER32!MessageBoxA
  9. :00401023  C7050020400003400000MOV     DWORD PTR [00402000],00004003
  10. :0040102D  C705042040003D114000MOV     DWORD PTR [00402004],0040113D
  11. :00401037  C7050820400000000000MOV     DWORD PTR [00402008],00000000
  12. :00401041  C7050C20400000000000MOV     DWORD PTR [0040200C],00000000
  13. :0040104B  A144204000          MOV     EAX,[00402044]
  14. :00401050  A310204000          MOV     [00402010],EAX
  15.  
  16. so, all you need to do now is to NOP out the call ;)..
  17. open the file with your favourite hex editor and search for
  18. E8DA010000 and change to
  19. 9090909090
  20. And no more nag screen..
  21. ---
  22. /Klefz