This tutorial are coming from

Acid Cool 178

Tutorial Number 44

Target

MaSStEr Crackme 1.01

Protection________________Name - Serial
Downlaod it at ___________crackmes.cjb.net 
Date_____________________27 March 2000
Toolz

Win32Dasm with SDR Enabled
Hex Editor ( I Use Ultra Edit Ver. 7.00B)
Smart Check (If you want)
Dasm and Soft Ice
Get the tools here http://protools.cjb.net / http://www.ultraedit.com 

Essay

Well, fisrt open the crackme in your hexeditor and scroll down, now can you see MSVBVM60.DLL and that file are the libary for  Visual Basic, the conclutoin are. This crackme are made in Visual Basic 6..

 

Run the crackme and enter you name and serial, press on the TrY button and you will get the message "HA!! SorrY old crap wrong!!" well, remember that.
Now, open the crackme in your W32Dasm and hope that it are not complied in P-Code, and it ain't and in "String Data References" so can you find this string..
HA!! SorrY old crap wrong!!", goto that code and now you can see this code.

* Possible StringData Ref from Code Obj ->"HA!! SorrY old chap wrong!!"
                                  |
:0040831F C7459C087A4000          mov [ebp-64], 00407A08
:00408326 C7459408000000          mov [ebp-6C], 00000008
:0040832D FFD7                    call edi
:0040832F 8D55A4                  lea edx, dword ptr [ebp-5C]
:00408332 8D45B4                  lea eax, dword ptr [ebp-4C]
:00408335 52                      push edx
:00408336 8D4DC4                  lea ecx, dword ptr [ebp-3C]
:00408339 50                      push eax
:0040833A 51                      push ecx
:0040833B 8D55D4                  lea edx, dword ptr [ebp-2C]
:0040833E 53                      push ebx
:0040833F 52                      push edx
* Reference To: MSVBVM60.rtcMsgBox, Ord:0253h
                                  |
:00408340 FF152C104000            Call dword ptr [0040102C]
:00408346 8D45A4                  lea eax, dword ptr [ebp-5C]
:00408349 8D4DB4                  lea ecx, dword ptr [ebp-4C]
:0040834C 50                      push eax
:0040834D 8D55C4                  lea edx, dword ptr [ebp-3C]
:00408350 51                      push ecx
:00408351 8D45D4                  lea eax, dword ptr [ebp-2C]
:00408354 52                      push edx
:00408355 50                      push eax
:00408356 6A04                    push 00000004

Here are the MessageBox created and if you want to remove that just nop out the call at 408340 and it are gone.

If you are scrolling up so can you see this

* Possible StringData Ref from Code Obj ->"1234567891"	<-- 1234567891 ?? that
                                  |
:0040828C 68DC794000              push 004079DC
* Reference To: MSVBVM60.__vbaStrCmp, Ord:0000h		<-- hmm, this are intressing.
                                  |
:00408291 FF154C104000            Call dword ptr [0040104C]
:00408297 8BF8                    mov edi, eax

Well, this are strange. I can see any "good work" or something like that but i can see "1234567891" and after that one "__vbaStrCmp" wich means "Visual Basic String Compare" and what are it comparing ? my serial ? I had to try, change  the serial with "1234567891" and ok. Crackme exit's, and it are now cracked..

Now, it's your turn. Crack it in Smart Check and write a tut in that. I have taken W32Dasm. Soft Ice / Hex / Smart Check remains left. Good Luck

Acid


Ending

This are one realy nice crackme for newbies, in everything. I haven't tried to crack in a HEX editor and Soft Ice. I will rak this to a skill 1..

LaZaRuS, Wajid, Borna Janes, ManKind, Eddie Van Camper, ACiD BuRN, KoRnFLeX, Eternal_Bliss, Potsmoke, DiABLO. Torn@do, ^AlX^ , AC|D, Dark Wolf, Marton and all the other i have forgotten