Posted September 28, 20231 yr CrackMe with Anti Patch The program uses VMP protection, and calls the relevant checksum SDK, even if the violent crack may also be slightly more complex, here provides a baymax patch tool to achieve the crack program, interested friends can read the pdf tutorial. The function of the program to determine whether the input is correct or not does not use the SDK for protection, and verify the error dialog box strings are searchable, but these do not mean that it is easy to crack, because the code also calls the memory checksum, determine whether the debugging and other SDK interfaces. So how to realize the cracking of this crackme? Baymax Patch App Protected by VMP is a PDF file, The detailed cracking process is explained above and can be consulted if you encounter difficulties while analyzing it. The PDF is divided into two volumes, the lower part can be downloaded from the Authors Solution section. Attached is the source code of crackMe, the bpt file is the corresponding crack project of baymax64, you can use baymax tool to generate the corresponding patch file to test and verify the effect. Baymax Patch App Protected by VMP (pdf file).zip.001 CrackMe Source Code.zip File Information Submitter Nisy Submitted 09/28/2023 Category CrackMe View File
December 19, 20231 yr 11 minutes ago, boot said: PDF_Part1 585.94 kB · 219 downloads PDF_Part2 437.46 kB · 73 downloads Baymax Patch App Protected by VMP.zip
February 20, 20241 yr Great crackme. In the end, I compiled version.dll and resolved this challenge through exception handling without modifying the memory of the main program module. Some simple steps: - Hook GetWindowText - Set hardware execution breakpoint at RVA = 0x1793 in the current thread - Execute Rip jump Rip += 0x68 version - CrackMe.zip
February 20, 20241 yr 1 hour ago, boot said: Great crackme. In the end, I compiled version.dll and resolved this challenge through exception handling without modifying the memory of the main program module. Some simple steps: - Hook GetWindowText - Set hardware execution breakpoint at RVA = 0x1793 in the current thread - Execute Rip jump Rip += 0x68 version - CrackMe.zip 65.92 kB · 3 downloads Great. @boot. Regards. sean.
Create an account or sign in to comment