Punisher's Tutorials
My Tutorials
Tutorials written: 24
This is my first tutorial. I choose this tutorial because as a newbie it is easier to explain so that other newbies can understand. In this tutorial I will teach you how to crack TwinExplorer 1.0 by patching it. |
|
Cracking JavaScript Scrambler V1.11-Using the Memory Echo Method. |
|
Finding a hardcoded serial number in Directory Printer 2.0. Another example of a foolish protection scheme by a lazy programmer. |
|
Turning a weak protection scheme into it's own Key Generator. |
|
Coming up with a Serial number which is half hard-coded and half calculated. Here is a Key Generator for Add/Remove v2.0. I did it in WIN95 Assembly Language. It may have a few bugs. I did not test it thoroughly. |
|
Using BRW - Borland's Resource Work to delete a nag screen thus removing the protection scheme. |
|
Splash is a web authoring tool that uses the TL32v20.DLL as it's protection scheme. |
|
Fishing for a hardcoded serial number the softice way. How stupid and lazy can these shareware protectionists get. |
|
Zen Fishing a serial number that is calculated from your name. |
|
Disassembling and seraching for a hard coded serial number. What a weak protection scheme. |
|
Cracking both Win-eXpose-Registry and Win-eXpose-IO by the same method. Same protection scheme for both of them. |
|
Fishing another hard coded serial number from another very easy and stupid protection scheme. |
|
Cracking ByteCatcher Pro v3.2 and ByteCatcher FTP Client v1.04. These two programs make use of the same protection scheme. Follow instructions for ByteCatcher Pro and you will crack ByteCatcher FTP Client. |
|
A hard-coded serial number. Yet another very stupid protection scheme. |
|
A very interesting but weak protetion scheme. Even if it is weak a newbye can learn much from it. |
|
Finding the compare of the real reg key with the fake reg key. |
|
When I downloaded this program I thought I was going to have a hard time cracking it. Lo and Behold it only 3 minutes. |
|
Finding the compare of our fake regcode with the real regcode. |
|
Locating the cmp of the real regkey with the fake regkey. |
|
Resurrecting a dead program by changing a couple jumps to make an expire program run for life. |
|
Searching for a hard coded serial number without even looking at the code. |
|
Locating the repz cmpsb to get the real regcode. |
|
Using the deadlisting method to get around a protection scheme. |
|
Killing two birds with one stone. Cracking two programs with the same protection scheme. |
|