Kurapica Posted April 7, 2008 Posted April 7, 2008 Keygen is required and no patching is allowed.CrackME.rar
Ufo-Pu55y Posted April 7, 2008 Posted April 7, 2008 There's an anti-reflector trick, which can be killed like this:Open the target in WinHex, then do a "Replace Hex Values" with "FFE2" to "0000"for all occurrences. This FFE2 is an invalid IL instruction, so I replaced it with 2 NOPs.Assembly still runs and reflector can browse the full IL code again.PS: PEBrowse can browse it without fixing tho...
Ufo-Pu55y Posted April 8, 2008 Posted April 8, 2008 I think it is fair enough to share this article (written by the dev of this protector): http://www.codeproject.com/KB/vb/StackCrypt.aspx But atm I'm still confused, ytf methods don't start with the 1st IL instruction. The 1st executed one is in the middle of the method instead
rongchaua Posted April 10, 2008 Posted April 10, 2008 (edited) @UFO-Pu55y: I can not bring the crackme run on my vista so I must analyse statically. Therefore I can not notice that the 1. executed instructions is in the middle of function. I will try to bring it run and see how it works. Hope I'll find something. . Edited April 10, 2008 by rongchaua
Ufo-Pu55y Posted April 10, 2008 Posted April 10, 2008 @UFO-Pu55y: I can not bring the crackme run on my vista so I must analyse statically. Therefore I can not notice that the 1. executed instructions is in the middle of function. I will try to bring it run and see how it works. Hope I'll find something. . No no, I was wrong. Everything gets executed like you see it in Reflector (after patching the bad ILs). I found out how to fish the encrypted strings with Olly. Looking for a more comfortable way to get them atm...
rongchaua Posted April 11, 2008 Posted April 11, 2008 Today I took a look at Goliath. I think we can restore the original code of assembly. I am writing a deobfuscator for it. Hope I can finish it.
Marcello Posted April 14, 2008 Posted April 14, 2008 I think it is fair enough to share this article (written by the dev of this protector):http://www.codeproject.com/KB/vb/StackCrypt.aspx But atm I'm still confused, ytf methods don't start with the 1st IL instruction. The 1st executed one is in the middle of the method instead Thanks for your advertising! best regards, Marcello Cantelmo www.cantelmosoftware.com
Marcello Posted April 14, 2008 Posted April 14, 2008 Keygen is required and no patching is allowed.CrackME.rar Marcello Cantelmo www.cantelmosoftware.com
Marcello Posted April 14, 2008 Posted April 14, 2008 There's an anti-reflector trick, which can be killed like this:Open the target in WinHex, then do a "Replace Hex Values" with "FFE2" to "0000" for all occurrences. This FFE2 is an invalid IL instruction, so I replaced it with 2 NOPs. Assembly still runs and reflector can browse the full IL code again. PS: PEBrowse can browse it without fixing tho... Marcello Cantelmo www.cantelmosoftware.com
Marcello Posted April 14, 2008 Posted April 14, 2008 (edited) Today I took a look at Goliath. I think we can restore the original code of assembly. I am writing a deobfuscator for it. Hope I can finish it. ...But after you have completed your obfuscator by a rating to my job? Marcello Cantelmo www.cantelmosoftware.com Edited April 14, 2008 by Marcello
Marcello Posted April 14, 2008 Posted April 14, 2008 @UFO-Pu55y: I can not bring the crackme run on my vista so I must analyse statically. Therefore I can not notice that the 1. executed instructions is in the middle of function. I will try to bring it run and see how it works. Hope I'll find something. . No no, I was wrong. Everything gets executed like you see it in Reflector (after patching the bad ILs). I found out how to fish the encrypted strings with Olly. Looking for a more comfortable way to get them atm... But how long are you losing to analyze the obfuscator of a stranger? I hope only that now microsoft create a .NET native compiler best regards, Marcello Cantelmo www.cantelmosoftware.com
Kurapica Posted April 15, 2008 Author Posted April 15, 2008 But how long are you losing to analyze the obfuscator of a stranger? I hope only that now microsoft create a .NET native compiler best regards, Marcello Cantelmo www.cantelmosoftware.com Do you think native compilers stopped people from reversing code ? you should think again
Marcello Posted April 15, 2008 Posted April 15, 2008 But how long are you losing to analyze the obfuscator of a stranger? I hope only that now microsoft create a .NET native compiler best regards, Marcello Cantelmo www.cantelmosoftware.com Do you think native compilers stopped people from reversing code ? you should think again One thing is the crack and another thing is the decompilation! The crack can be used as an advertising our product. Now all feel hackers. You do not have to lose even more time to understand an algorithm MS that has always fought piracy now does nothing if one of his employees realized a decompiler and forces us to use an obfuscator. It is better to create a native compiler!!! Lutz is a MS developer who created r3fl3ct0r (for free). MS suggests using d0tfusc4t0r ($1900). Other company (jungl3 cr34tur3s) has created a decompiler but if you purchase MSDN enjoy a 50% discount on the product. Members will another company (x3n0c0d3) was formed by ex product manager MS I think its something wrong. Must not offend my intelligence! If I continue to use the MS products the *security* is a essential requirement. This is not just my thoughts (but many). Probably forcing us to use patents How can I become a h4ck3r? I know that the market is much more rewarding :cool: best regards, Marcello Cantelmo www.cantelmosoftware.com
Ufo-Pu55y Posted April 15, 2008 Posted April 15, 2008 The crack can be used as an advertising our product. Now all feel hackers.Soon while entering "goliath" into google, you will notice an entry like "Goliath Unpacker v1.0.......".Congratulation... nice adv3rtis3m3nt ! That is.. only if some guy will come up and think that it's worth it at all In other words: Find some clients for your protector, and we'll find somewhat more motivation to own your code...
Marcello Posted April 15, 2008 Posted April 15, 2008 The crack can be used as an advertising our product. Now all feel hackers.Soon while entering "goliath" into google, you will notice an entry like "Goliath Unpacker v1.0.......".Congratulation... nice adv3rtis3m3nt ! That is.. only if some guy will come up and think that it's worth it at all In other words: Find some clients for your protector, and we'll find somewhat more motivation to own your code... Crack understood as removal of protection and then use it without valid license . Advertising is that you use the program but then you need to protect programs to be distributed You, however, are more talented and have all done a unpacker! Why not exploit your intelligence to make things better? Maybe your obfuscator since. Net is a vulnerable platform? :biggrin: Expect your unpacker before issuing Goliath .NET Onfuscator 3.x (tnx for *free* beta tester support) Marcello Cantelmo www.cantelmosoftware.com
CodeExplorer Posted March 27, 2009 Posted March 27, 2009 Keygen + source + some tutorials:http://www.plunder.com/keygen-net-Crackme-...-27388bc1d6.htmCheers,CodeRipper
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now