Nisy Posted October 12, 2023 Posted October 12, 2023 View File CrackMe with Anti Patch The program uses VMP protection, and calls the relevant checksum SDK, even if the violent crack may also be slightly more complex, here provides a baymax patch tool to achieve the crack program, interested friends can read the pdf tutorial. The function of the program to determine whether the input is correct or not does not use the SDK for protection, and verify the error dialog box strings are searchable, but these do not mean that it is easy to crack, because the code also calls the memory checksum, determine whether the debugging and other SDK interfaces. So how to realize the cracking of this crackme? Baymax Patch App Protected by VMP is a PDF file, The detailed cracking process is explained above and can be consulted if you encounter difficulties while analyzing it. The PDF is divided into two volumes, the lower part can be downloaded from the Authors Solution section. Attached is the source code of crackMe, the bpt file is the corresponding crack project of baymax64, you can use baymax tool to generate the corresponding patch file to test and verify the effect. Baymax Patch App Protected by VMP (pdf file).zip.001 CrackMe Source Code.zip Submitter Nisy Submitted 09/28/2023 Category CrackMe 1
Sean the hard worker Posted December 19, 2023 Posted December 19, 2023 (edited) sean. Edited December 19, 2023 by windowbase 1
boot Posted December 19, 2023 Posted December 19, 2023 31 minutes ago, windowbase said: sean. PDF_Part1 PDF_Part2 2
Sean the hard worker Posted December 19, 2023 Posted December 19, 2023 11 minutes ago, boot said: PDF_Part1 585.94 kB · 219 downloads PDF_Part2 437.46 kB · 73 downloads Baymax Patch App Protected by VMP.zip 4
boot Posted February 20 Posted February 20 Great crackme. In the end, I compiled version.dll and resolved this challenge through exception handling without modifying the memory of the main program module. Some simple steps: - Hook GetWindowText - Set hardware execution breakpoint at RVA = 0x1793 in the current thread - Execute Rip jump Rip += 0x68 version - CrackMe.zip 1
Sean the hard worker Posted February 20 Posted February 20 1 hour ago, boot said: Great crackme. In the end, I compiled version.dll and resolved this challenge through exception handling without modifying the memory of the main program module. Some simple steps: - Hook GetWindowText - Set hardware execution breakpoint at RVA = 0x1793 in the current thread - Execute Rip jump Rip += 0x68 version - CrackMe.zip 65.92 kB · 3 downloads Great. @boot. Regards. sean. 2
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now