Jump to content

[keygenme] Anti Olly 1.0...

Teddy Rogers

Recommended Posts

Teddy Rogers

Seeing as a few people seem to be "anti Olly'ing" recently I thought this crackme from crackme.de may be of interest to a few people here.

A little crackme just for fun.

1) bypass the anti debug / junk

2) bruteforce / keygen

3) write a tut :)

rulez : use only a 'standard' version of OllyDbg (or it's not fun)

no HideDebugger plugin or OllyIce or things like that.


Difficulty: 3 - Getting harder

Platform: Windows

Language: Borland Delphi




Link to comment
  • 2 years later...

The [keygenme] tag has been added to your topic title.

Please remember to follow and adhere to the topic title format - thankyou!

[This is an automated reply]

Link to comment
  • 1 month later...

crackme nice.

I solved some years ago (2007) in this year try to do something new,

in this year, (because in English a little better)

i will try first in spanish and post in english..

attach my keygen beta 1, was tested in 3 pc, 
if can test and work (, can improve more funtions as random for keygen value)
if some bug please PM me, 
atached keygen+value keygen 
the value keygen is an analisis of 9mill of numbers tested and taked the valid key
as math(number ingresed - magic value= valid key when 0f08 ) 
the tutorial is in work for can be released.

keygen spanish for antiollydbg 1.0 by Apuromafo.zip

greetings Apuromafo


this is a great crackme,
some years old post this.. 
was analized with more detail, and checked 9 millon of serial and in more that 1 pc.., i was understanded the algo and do the values corrects..if some one wana a keygen i was have in write text 4 but are in spanish..

1) bypass the anti debug / junk ->done
2) bruteforce / keygen->
keygen in excel and masm 
3) write a tut :)



Edited by Apuromafo
Link to comment
  • 10 years later...

I can't bypass anti-debug stuff. I'd do:

-IsDebuggerPresent bypass: easy

-"Debugger Detected" messagebox bypass:

00477B12   . 74 1D          JE SHORT Anti_Oll.00477B31                                        ; important conditial jump, i have to jump 0x477B31 to bypass
00477B14   . BB E8030000    MOV EBX,0x3E8
00477B19   > 8D55 F0        LEA EDX,DWORD PTR SS:[EBP-0x10]                           
00477B1C   . B8 987C4700    MOV EAX,Anti_Oll.00477C98
00477B21   . E8 C6DFFFFF    CALL Anti_Oll.00475AEC
00477B26   . 8B45 F0        MOV EAX,DWORD PTR SS:[EBP-0x10]                                   ; eax = ASCII "Debugger Detected ! "
00477B29   . E8 5635FBFF    CALL Anti_Oll.0042B084                                            ; create message box, and wait till user input (click ok button)
00477B2E   . 4B             DEC EBX                                                           ; ebx always greater than 1
00477B2F   .^75 E8          JNZ SHORT Anti_Oll.00477B19                                       ; so this is basically infinite loop

-OutputDebugString bypass: I made the start of the function 'ret 4'.


But ı'm stuck here.



Link to comment

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Create New...