by :
OCHE SATRIANI
Before you start cracking it's very important to know what programming language does the
program is written with, coz it will help you to determine what CRACKING TOOLS you will
need to use, if the program is written with VISUAL BASIC then you will need SMARTCHECK !
but in this case the program is written with BORLAND C++ with the STUPID programmer
PATRIK NILSSON, I say it STUPID coz there is a lot of BUGS in this PROGS and the STUPID protection they have. Anyway you can use this PROGGIE more than 50 times and you don't need to CRACK it do you know how to do that ?
OK let's start ....
(before you start, disassembled the SITEBUI~1.EXE with W32DASM)
Go to the registration area and entered the name with '
OCHE SATRIANI ' and theBPX MESSAGEBEEP
:0040AE72 E8078F0D00
Call 004E3D7E -----> CALL MESSAGEBEEP
Now W32DASM will make it simple
go to that OFFSET address by pressing SHIFT F12 and then entered the OFFSET address
(in my case 0040AE77)
* Possible StringData Ref from Data Obj ->
"I'm sorry but you wrote the wrong serial number!"
Very Interesting ...
Look there is a CONDITIONAL JUMP -- [0040AD55(C)] -- go to this CODE LOCATION !
:0040AD4D
E832390600 call 0046E684 --------------> remember the OFFSET
WHAT HAPPEN INSIDE THE CALL 0046E684 ?
:0046E684 55
push ebpAfter you trace the
mov eax, dword ptr [ebp-04] then EAX will contain the address of the real SN#Type this in SOFTICE ---> D EAX in my case you'll see
5C 9C 9A 00 (they always store in BACKWARD) what to do next is to DUMP that address Type D 009A9C5C. There you see your DUMMY CODE and the REAL ONE.591568-570643-396452
[FAQ]
[READER] : HOW I CAN MAKE SOFTICE TO BREAK ON THIS
call 0046E684 ?[OCHE] : EASY , DO YOU REMEMBER THE OFFSET ? MY CASE
0040AD4D[READER] : IT DOESN'T WORK ??????????
[OCHE] : TRY THE
BPX MESSAGEBEEP THEN BPX 0040AD4D, IF IT STILL DOESN'T WORK
VOL. 4
OE'97 ITS 4397100xxx
oche_satriani@start.com.au
oblek@start.com.au