home *** CD-ROM | disk | FTP | other *** search
- Greetings Crackers,
-
- Well here is how I've solved n0p3x's KeyFILE CrackMe ... I can't write a complete tutorial
- due time reasons ... I do think you will understand this tut anyway:
-
- 1) BPX CreateFileA
- => N0P3X.KEY (Read 0xA bytes)
-
- 2) some tracing in SoftICE till you come accross
-
- :00401113 XOR BYTE PTR [EAX+004020F3],43 ; XOR read values with 43h
- :0040111A INC EAX ; counter + 1
- :0040111B CMP BYTE PTR [EAX+004020F3],00 ; nothing enterd
- :00401122 JNZ 00401113 ; if so => invalid keyfile
- :00401124 PUSH 004020F3 ; manipulated read data
- :00401129 PUSH 004020FD ; good data
- :0040112E CALL KERNEL32!lstrcmp ; compare them
- :00401133 CMP EAX,00 ; everything ok?
- :00401136 JZ 0040113E ; if so => Purchase Msg Box
- :00401138 JMP 00401158 ; if not => Unregistered Msg Box
-
- 3) so to get Purchase Msg Box we have to find out what our code has to be (00) after
- XOR 43h ... and you know XOR variable, variable is 0 ... so the solution is just
- CCCCCCCCCC
-
- 4) CrackMe solved ... that wasn't hard ... was it?
- Post questions regarding this CrackMe at http://disc.server.com/discussion.cgi?id=42092
-
-
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- TORN@DO [CF2K leader and ID member]