Mohd Posted September 9, 2020 Share Posted September 9, 2020 View File DNGuard HVM v3.953 Try to unpack or alternatively provide the secret key, URL, Name and Address Protections used: DNGuard Enterprice HVM 3.953 Good luck. Submitter Mohd Submitted 09/08/2020 Category UnPackMe (.NET) 2 Link to comment Share on other sites More sharing options...
Washi Posted September 9, 2020 Share Posted September 9, 2020 (edited) Since the challenge description allows it, I'm going for the quick serial fish for now Spoiler Secret Key: AWX610881RFFJSDJSZV URL: http://localhost:52735/ Vendor: Fadi Sami Khalid Address: Jordan - Amman - Khalda Approach: Spoiler Obfuscation does not really matter if your methods are just simple string comparisons. The x86 generated by the JIT compiler still reveals everything Run app, enter random stuff in textboxes, press Validate to trigger the JIT compiler to compile the validation method. Notice text of the label changes to Not Correct. Attach WinDbg, set breakpoint on Control.set_Text (use !name2ee System.Windows.Forms.dll System.Windows.Control.set_Text to get the address to breakpoint). Continue execution and press Validate again. Type !clrstack to notice the click handler is in Form1._01.01. Copy the address of the handler and dump the x86 code using !U <address>. (dump here https://pastebin.com/br3s09Gv) Notice in x86 code its just a bunch of string.Equals calls. Set a breakpoint on all string.Equals(string, string) calls in the method. Continue execution and press Validate one more time again. Use !dumpstackobjects to read out the correct values for every one of these calls. Edited September 9, 2020 by Washi 2 2 Link to comment Share on other sites More sharing options...
AzoresRCE Posted September 10, 2020 Share Posted September 10, 2020 (edited) I would just like to point out that this is DNGuard Enterprise HVM 3.9.5.1 not 3.9.5.3 Edited September 10, 2020 by AzoresRCE 1 1 Link to comment Share on other sites More sharing options...
0x59 Posted January 3, 2021 Share Posted January 3, 2021 (edited) Test_App_-_Full_-_End_Encrptoin-Unpacked.rar --Not unpacked by me-- Hook jit and after use dng hvm unpacker by @CodeExplorer just update anti-eh anti-eh2 anti-jit Open hvmruntime.dll on ghidra and go to Export/VMRuntime and start analysing it Edited January 5, 2021 by 0x59 1 Link to comment Share on other sites More sharing options...
GautamGreat Posted January 5, 2021 Share Posted January 5, 2021 On 1/4/2021 at 3:02 AM, 0x59 said: Test_App_-_Full_-_End_Encrptoin-Unpacked.rar --Not unpacked by me-- Hook jit and after use dng hvm unpacker by @CodeExplorer just update anti-eh anti-eh2 anti-jit Tell me if u need more info I would love to have some information about hooking Jit Link to comment Share on other sites More sharing options...
0x59 Posted January 5, 2021 Share Posted January 5, 2021 5 hours ago, GautamGreat said: I would love to have some information about hooking Jit just dm me sir 1 1 Link to comment Share on other sites More sharing options...
Solution BlackHat Posted August 28, 2021 Solution Share Posted August 28, 2021 How to Unpack ? Spoiler You need to Hook the JIT Code at Runtime by executing the file. Now Detect the Method Bodies in JIT and Read it with .Net Libraries, Your main work is to restore the value of Instructions but Here is a catch that Method Tokens are encrypted/locked in HVM Version. You need to Analyze and understand the Runtime.dll to Restore the value. You can Restore the Original and Remove proxy by analyzing the methods after devirting. Strings are also encrypted but just Invoke static string methods in "ZYXDNGuarder" and restore those with Original Value. Decrypt HVM Token and the Offset Value of HVM Table --> Parse their Structure Schema and Read HVM Table At Last Read Methods after detecting those and append in your Main Assembly. Solution - Spoiler 3.9.5.3.zip 4 1 Link to comment Share on other sites More sharing options...
GeGe Posted September 21, 2021 Share Posted September 21, 2021 确定.zip Link to comment Share on other sites More sharing options...
CodeExplorer Posted September 9 Share Posted September 9 On 9/10/2020 at 12:09 PM, AzoresRCE said: I would just like to point out that this is DNGuard Enterprise HVM 3.9.5.1 not 3.9.5.3 Sometimes DNGuard author don't change the version number. Anyway this unpackme require netstandard 2.0 dll, your can get it from https://www.dllme.com/dll/files/netstandard/c207d3c8d3776e15d2c43fd26ace385c or attached. Yes @0x59. More info needed. netstandard_x86.zip Link to comment Share on other sites More sharing options...
im_nop Posted September 18 Share Posted September 18 thank u for ur share this reverse tool~ 1 Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now