Cracking Tutorial for
|Before we start, please read the Disclaimer section of this essay!|
|Well, I thought nobody requires a tutorial for
that program - but one Newbie ask for one (perhaps he hasn't even "tried" to
crack it), because he got lost in the program (??). So here it is:
Well, let's run the target and see what we can find out. A NAG-Screen appears saying "SimulBrowse 1.5 is shareware ...". This looks like a standard messagebox. So now press OK. Go to the Help-Menu and choose Register. Now a dialog "Validation" asks for our User Name and Registration Number. So enter "Cracking Tutorial" and "999999999". Press Ok. Now you get "Your registration user name and password could not be validated". So press OK and exit the application. The NAG-Screen pops up once again and then the application exits. So we know enough to take our Disassembler and have a look at the program in
Now choose String Reference and look for interesting strings. I found the following interesting:
|This tutorial was written by
TORN@DO. I hope you enjoyed reading it as I enjoyed writing it - I'm always trying to
improve my writing skills.
I'd like to greet the following people (no specific order):
+ORC, Fravia, nIabI, JosephCo, Razzia, MisterE, Krazy_N, Vizion, YOSHi, Qapla, Odin
everyone in #Cracking and in #Cracking4Newbies ... and everyone else I forgot.
;eax=ffffffff if fail
;eax=1 if correct
:004237D4 83C408 add esp, 00000008
:004237D7 85C0 test eax, eax ;serial correct?
:004237D9 7502 jne 004237DD ;No? then jump
If you have a dead
listing close by for this program then you'll see how close all these instructions
are to our original Softice breakpoint on messageboxa.
At this point I cleared all of Softice's previous breakpoints by typing: bc *
then I type: bpx 004237cf then x to leave Softice.
Now re-run the registration process again and once again Softice breaks but this time on our newly created breakpoint at: 004237cf
Press the 'F10' key once, yep that's right don't trace into this call, just step over it. Now it's interesting to monitor the state of the pc's registers after you've just skipped over a call because this can reveal quite a lot about what the call has just been doing.
So now type: D ecx and you'll see in Softice's code window the *real* serial number you need to use to register this babe!.
If you type D edx then you'll see your *fake* serial.
Now re-run this program
but now use the *real* serial number you've just sniffed out.
My thanks and gratitude goes to:-
Fravia+ for providing possibly the greatest source of Reverse Engineering
knowledge on the Web.
+ORC for showing me the light at the end of the tunnel.
Ripping off software through serials
and cracks is for lamers..
If your looking for cracks or serial numbers from these pages then your wasting your time, try searching elsewhere on the Web under Warze, Cracks etc.
|Next||Return to Essay Index||Previous|
, dword ptr [ecx+01] ;