Cast
January 8th, 2001, 13:31
Hello people,
Ive been working with this protection for a bit, and ive gotten my target to run when i apply some memory patches, however it would be nice to dump the decrypted cdilla protected executable, or patch in some sort of crack (IAT hooking i was thinking about on the date checks).. Has anyone worked on this? Is there a way to dump the executable somewhat easily or does it require some cracking inside the cdilla decryption drivers?
Anyone been looking at the Cdilla auth. code system? it seems not too advanced, maybe 100-120 lines of asm code. But i am not sure.
I'll be interested in any information i can get. Thanks
Ive been working with this protection for a bit, and ive gotten my target to run when i apply some memory patches, however it would be nice to dump the decrypted cdilla protected executable, or patch in some sort of crack (IAT hooking i was thinking about on the date checks).. Has anyone worked on this? Is there a way to dump the executable somewhat easily or does it require some cracking inside the cdilla decryption drivers?
Anyone been looking at the Cdilla auth. code system? it seems not too advanced, maybe 100-120 lines of asm code. But i am not sure.
I'll be interested in any information i can get. Thanks