Jump to content
Tuts 4 You

CrackMe with Anti Patch


Recommended Posts

Posted

CrackMe with Anti Patch


The program uses VMP protection, and calls the relevant checksum SDK, even if the violent crack may also be slightly more complex, here provides a baymax patch tool to achieve the crack program, interested friends can read the pdf tutorial.

The function of the program to determine whether the input is correct or not does not use the SDK for protection, and verify the error dialog box strings are searchable, but these do not mean that it is easy to crack, because the code also calls the memory checksum, determine whether the debugging and other SDK interfaces. So how to realize the cracking of this crackme?

Baymax Patch App Protected by VMP is a PDF file, The detailed cracking process is explained above and can be consulted if you encounter difficulties while analyzing it. The PDF is divided into two volumes, the lower part can be downloaded from the Authors Solution section. 

Attached is the source code of crackMe, the bpt file is the corresponding crack project of baymax64, you can use baymax tool to generate the corresponding patch file to test and verify the effect.

 

 

Baymax Patch App Protected by VMP (pdf file).zip.001 CrackMe Source Code.zip


 

  • Like 1
  • 2 months later...
Posted

The second part of zip file is not there 

  • Like 1
Sean Park - Lovejoy
Posted (edited)

 

 

7052.png

 

sean.

Edited by windowbase
  • Like 1
  • 2 months later...
Posted

Great crackme. In the end, I compiled version.dll and resolved this challenge through exception handling without modifying the memory of the main program module.

Some simple steps:

 - Hook GetWindowText

 - Set hardware execution breakpoint at RVA = 0x1793 in the current thread

 - Execute Rip jump Rip += 0x68

version - CrackMe.zip

  • Like 1
Sean Park - Lovejoy
Posted
1 hour ago, boot said:

Great crackme. In the end, I compiled version.dll and resolved this challenge through exception handling without modifying the memory of the main program module.

Some simple steps:

 - Hook GetWindowText

 - Set hardware execution breakpoint at RVA = 0x1793 in the current thread

 - Execute Rip jump Rip += 0x68

version - CrackMe.zip 65.92 kB · 3 downloads

Great. @boot.

Regards.

sean.

  • Like 2

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...