home *** CD-ROM | disk | FTP | other *** search
- ┌────────────────────────────────────────────────────────────────────────────┐
- │ TRON V1.06 PROGRAM INFORMATION │
- └────────────────────────────────────────────────────────────────────────────┘
-
- Programmed by the SMILESOFT Company (Germany)
-
- The smilesoft company consists of 4, 16-18 year old coders in
- the pc section...
-
-
-
- ───────────────────────────────────────────────────────────────────────────────
- 1.1 What is Tron?
- ───────────────────────────────────────────────────────────────────────────────
-
- Tron is an decompressor for files packed with compressors like
- PKLITE or DIET. In case you don't know, such programs use different
- data compression routines to make a file smaller. Files which
- were compressed with one of these pack programs will still stay
- executable for the system but they will be much smaller. Another
- reason for compressing is that a second person has no chance
- to change any bytes inside a compressed program with a hex editor
- or something like that. But this feature has disadvantages, too.
- For example a virus scanner is not abble to detect a virus under
- the compression structure. And on some systems a decompression routine
- wastes a lot of time (8086 or lower, hehe).
-
- The first is the primary reason why we decided to write Tron.
- Tron itself is able to decompress most common packers as there are
- PKLITE, DIET, LZEXE, TINY, EXEPACK, PRO-PACK, COMPACK etc..
-
- Some of these compression programs have a build in EXPAND function!
- But for insiders it is no problem to trick this functions out!
- "Simply change the Header Signature "MZ" into "ZM" and the original
- programs cannot handle their own files any longer. The header signature
- can be found at the start of an EXE file!
- And this is only one of many known possibilities.
-
- To unpack TinyProg packed files you must register first.
- (READ REGISTER.TXT)
- Before running tronreg.exe make sure that the tron.exe file
- is not packed. After registering tron can be packed again.
-
-
- ───────────────────────────────────────────────────────────────────────────────
- 1.2 Language
- ───────────────────────────────────────────────────────────────────────────────
-
- Tron was fully written in the assembly language because many functions
- we need in our routines would be to slow and to big in C or Pascal.
- The memory hunger was another problem. Tron uses about 14 Kb of system
- memory.
-
-
- ───────────────────────────────────────────────────────────────────────────────
- 1.3 Technical Info
- ───────────────────────────────────────────────────────────────────────────────
-
-
- First tron loads the selected file into memory using the
- dos function (AH = 4BH). After loading, it searches for the presence of a
- packing code. Is such a routine discovered tron makes some changes to the
- original compression code, through this changes the pack routine tells
- tron what it had to know about the file, for example the informations
- needed to rebuild the original header or the expanded size and the
- relocation items. If the compressors make no trouble, the file can be
- written back to disk without problems.
-
-
- ───────────────────────────────────────────────────────────────────────────────
- Requirements:
- ───────────────────────────────────────────────────────────────────────────────
-
- - Memory (14Kb + working size of the exe file)
- - MS-DOS 3.3+
- - 80286+
-
-
- ───────────────────────────────────────────────────────────────────────────────
- Syntax:
- ───────────────────────────────────────────────────────────────────────────────
-
- usage: TRON [options] [d:][\path]Infile [[d:][\path]Outfile]
-
- The default extension for the expanded file is *.exp
-
- For example:
-
- The Command: TRON SMILE.EXE [Return] generates two files:
-
- - Smile.exe | the old file
- - Smile.exp | the original EXE file
-
- Options:
-
- -i = info only
- If you just want to know if a file is packed or with which packer it
- was compressed, then use this option.
- Using this option tron will not try to decompress the file.
-
- -d = Encryption Scanner
- (Use this option only if the normal search modus has no succes!)
- There are a lot of programs which original compression routines were
- modyfied to make decompression a bit harder.
- This option tries to fake such encrypted compression routines.
- The programm code is executed till tron detects a compression routine
- or has to abort because the program itself activates.
- For example the encryption used by the new PKLITE extra
- compression code (v1.14/v1.15/v1.20) is simply trixed out. In feature
- this option will be widely supported. In this version the scanner
- is only avaiable for EXE files.
-
- -e = Expand Header Size
- Normally TRON tries to make the smallest possible EXE-File.
- But most linkers allign the header on a sector (512 Bytes).
- In some cases these files can be loaded faster because DOS is
- only able to read a whole sector into memory.
- (1 Sector has 512 Bytes), figger it out!
-
- -x = No diverting of Interrupts
- Warning! In some cases it is possible that a file under these
- circumstances is EXECUTED! Don't use this on virus infected files!
-
- -r = all dangerous interrupts are diverted into tron!
- There is no possibilty that a program can damage something.
-
- ───────────────────────────────────────────────────────────────────────────────
- Notes on different encrypting & packing routines
- ───────────────────────────────────────────────────────────────────────────────
-
- 1. PROTECT! EXE/COM 3.0 by Jeremy Lilley (Released 1993)
-
- Quoting from PROTEXCM.DOC (doc-file of Protect! EXE/COM 3.0)
-
- "A security envelope makes a thorough CRC check to make sure
- that nobody has tampered with the file and anti-debugging techniques are
- used to make it more difficult to trace through with a debugger."
-
- "The first few versions of Protect! EXE/COM were not entirely secure
- and eventually had unprotects made for them. Now Protect! EXE/COM v.3.0 is
- out with anti-debugging techniques, rewritten headers, and many more things
- going for it."
-
- "This program is not the same program that it was a few months ago and
- many times more time was spent developing this version of Protect!
- han with other versions."
-
- Think want you want, of cause it took some time to generate a working
- decryption routine cause PROTECT uses some really annoying technics.
- But in the end unprotecting was possible!
- Protect! EXE/COM is really a nice program to prevent hacking.
- (One of the best in the scene!)
-
-
- 2. ICE 1.00 (Released 1988)
-
- ICE is a program which scramples and compresses COM files
- (not EXE files) yet allows them to be fully functional. The program
- makes it difficult to alter the orginal program and it has the added
- bonus of compressing COM files without detracting from their usefulness.
- ICEd COM files still run as they did before ICE offers protection
- agains viruses in that ICE can scramble COMMAND.COM and make it difficult
- for viruses to attach themselves to the scramble program.
-
- The Author of Ice says:
- I have written an ICE BREAKER for ICEd programs and I am sure that any
- good hacker could also figure it out after a while. No software
- resource can be protected entirely by software. I can only guarantee
- thatICE makes COM file safer, not 100% safe.
-
- That was right, does anybody know about another version of ice?
-
- ───────────────────────────────────────────────────────────────────────────────
-
- Last Minutes Note:
-
- If you have a file which is packed or crippled in a way, so that tron can't
- handle it, then send the concerned file to us!
- We are very happy about such files!
-
- Michael of Smilesoft Productions
-
- (Send all bugreports to me! use the adress under)
- We are happy about every letter we receive from you!
-
- Michael Bauder
- 73230 Kirchheim
- Kornbergstraße 14
- Germany
-
-
- ──══----- THE END -----═──
-