Acid_Cool_178
presents he's
#5 Tutorial |
Athour Information |
acid_cool_178@hotmail.com | ||
Age | 17 | |
Web Page | http://acidcool.cjb.net/ | |
Member in | Hellforge | Flying Horse Cracking Force |
Groups Web Page | Hellforge Login | FHCF Login |
Program Infromation |
Name | PhoX's NAG removal CrackMe | |||
Crackme1.exe | ||||
Athour | PhoX | |||
Where to Downlaod | The Crackme Website | |||
Tools used | W32Dasm Hiew |
Downlaod At | ||
1. Programmer Tool's | ||||
2. Player Tools | ||||
Size | 8KB | |||
What kind of a program | Crackme | Shareware | ||
Skill | Easy | Not so easy | Hard | X-pert |
Information about the protection |
This protection got a NAG when you are starting the program.
Before we start |
Well, another NAG for me :) I Just Love NAG's now.
Task1 <-- Removing The NAG
Task2 <-- Removing The NAG woth SoftIce
Task3 <-- Fun
The Process |
Task1
well, i did open the crackme1.exe in W32Dasm and founded this string at "String Data
References" Plz register this crackme..
U bet we will register this crackme.
Dubbleclick on the string and you will see this code.
* Possible StringData Ref from Data Obj ->"Plz
registrate this CrackMe..."
|
:00401013 688D204000 push 0040208D
<-- U land here
:00401018 FF3548204000 push dword ptr [00402048]
* Reference To: USER32.MessageBoxA, Ord:0000h <-- Wath,
MessaxeBoxa ?
|
:0040101E E8DA010000 Call 004011FD
<-- Calling NAG, Calling NAG, Calling NAG
:00401023 C7050020400003400000 mov dword ptr [00402000], 00004003
:0040102D C705042040003D114000 mov dword ptr [00402004], 0040113D
:0040101E are calling the ang and we have to remove that call by NOP'ing it. Take a
look in W32Dasm's statusbar and there you can see this @Offset 0000061E.
Open crackme1.exe in Hiew and press enter two times so you can see ASM code. GoTo (F5) 61E
and Edit (F3) the code. Nop the call by pressing 90 5 times and Update the file (F9) and
Exit (F10 or Esc) Run The Crackme And the NAG are gone.
Task2
Open SoftIce by pressing CTRL+D and type BPX MessageBoxA and exit SoftIce by pressing
CTRL+D. Now, start the crackme and SoftIce poups up and now you must clear all
breaikpoints by pressing BC *. Now you will see a Call!User32MessageBoxa somewher in the
code. But a breakpoint at thet location and exit SoftIce by pressing CTRL+D and start The
crackme. BANG, SoftIve poups up and you are standing at the Call!User32MessagaBoxA.
Type this
A | Enter |
NOP | Enter |
NOP | Enter |
NOP | Enter |
NOP | Enter |
NOP | Enter |
Enter |
And the NAG didn't apperar :)
Task3
When you are running the program and a NAG are comming up, you clock on OK and another
window comes up with a button with this caption "About". when you are clickking
on that button then a messagebox will apperar. Lets Remove that function but the button
wil be there. So open crackme1.exe in W32Dasm and goto "String Data References"
and i founded this string About
* Possible StringData Ref from Data Obj ->"About"
|
:0040117C 681A214000 push 0040211A <--
Nop here
* Possible StringData Ref from Data Obj ->"CrackMe 1.0"
|
:00401181 6820214000 push 00402120
:00401186 FF3548204000 push dword ptr [00402048]
* Reference To: USER32.MessageBoxA, Ord:0000h
|
:0040118C E86C000000 Call 004011FD <--
Or Nop here
As you can see so have we tho choices :) Bon apetitt ;) I wont tell you HOW TO now
anymore.
Now, When you hace clickked OK buttin on the NAG and a new window will appera. Lets remove
that window :) I founded this string. PhoX's Crackme 1.0
* Possible StringData Ref from Data Obj ->"PhoX's CrackMe 1.0"
|
:004010C1 6850204000 push 00402050
<-- Nop here
* Possible StringData Ref from Data Obj ->"ASMClass"
|
:004010C6 6863204000 push 00402063
:004010CB 6A00 push 00000000
* Reference To: USER32.CreateWindowExA, Ord:0000h
|
:004010CD E807010000 Call 004011D9
<-- Or Nop here
:004010D2 A348204000 mov dword ptr [00402048], eax
:004010D7 6A00 push 00000000
Ending |
Wel, now we have removed another ANG with Patching and SoftIce.
Greetings |
LaZaRuS, Wajid, Borna Janes, ManKind, Eddie Van Camper, ACiD BuRN, KoRnFLeX, Eternal_Bliss and all the other i have forgotten