![]() |
![]() |
![]() |
![]() |
![]() |
||||||||||
|
||||||||||||||
![]() |
#11
|
|||
|
|||
![]() You mean I have to search for another protection tool then... :P
Edit: Well, I took a look at the 'decrypted' CrackMe in Reflector and it crashes in most methods. Did you only decrypt the important sections Kurapica? Also I don't think that this scenario can be compared to a real application where an assymetric key would be used so the cracker would need to manipulate the executable (license checks or stored public key). I'm wondering how hard it would be to produce a patched exe that actually runs. So another cracking challenge with .Net Reactors inbuild keyfile protection would be nice ![]() Last edited by Andu : 06-16-2009 at 08:19 PM. |
#12
|
|||
|
|||
![]() Ow please just cut the bullshit
![]() If ur where smart you would contact one of the people here and pay him a big pile of money to realy improve ur shit accept of posting one terribly failed protection system attempt after another. You really dont see that we are laughing our asses off here? |
#13
|
|||
|
|||
![]() I have checked the extracted assembly of Kurapica, and as I already mentioned before, all methods in the main form are empty... completely missing my (simple) validation code. I suspect Kurapica and kao used a debugger to 'catch' the code directly. In case you are forced to patch it (asymmetric encryption...) it is certainly a completely different chellange. Damn I should have name this babe "patchme". :-)
|
#14
|
|||
|
|||
![]() Quote:
![]() Talk is cheap. If you wanted to test a real-life scenario, you should have done that in first place. Or you can do it now by making a new unpackme/patchme. ![]() |
#15
|
|||
|
|||
![]() +1 for creating another crackme with build in protection (assymetric) or patchme cause it's a completely different kettle of fish
![]() |
#16
|
|||
|
|||
![]() OK, here is my new crackme. Now you are forced to patch it. Hopefully you need more than 10-20 minutes this time! :-)
http://www.mediafire.com/?xal0mhjbym2 http://rapidshare.com/files/24561070...kMe_2.rar.html @kao I wrote "I have tried this way but the relevant methods are empty." Last edited by FarJump : 06-17-2009 at 01:05 PM. |
#17
|
|||
|
|||
![]() There is nothing new in Reactor except the new necrobit update where the original MSIL code is encrypted and not placed somewhere naked in the file, anyway it won't be so hard to restore the code after decryption.
@FarJump : Do you work for andu too ?
__________________
Life can only be understood backwards but It must be read forwards. |
#18
|
|||
|
|||
![]() I don't really care about most differences and I'm not particular interested in nerobit. I'm mainly interested in preventing my soft from any manipulation and NR does the best job for me so far. Show me I'm wrong and patch my new crackme. It can't be so hard, right?
![]() ![]() |
#19
|
|||
|
|||
![]() Just curious... has anybody made any progress in cracking this?
|
#20
|
|||
|
|||
![]() Didnt take a look at it, but if you want a ton of free security advice to make this product of yours something usefull PM me, iam kinda sick of this cat and mouse game just want to get it over with
|