Reverse Engineering RET Homepage RET Members Reverse Engineering Projects Reverse Engineering Papers Reversing Challenges Reverser Tools RET Re-Search Engine Reverse Engineering Forum Reverse Engineering Links

Go Back   Reverse Engineering Team Board > Reverse Engineering Board > General Forum
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Reply
 
Thread Tools Display Modes
  #1  
Old 12-09-2004, 12:07 AM
sgpiggybank sgpiggybank is offline
Junior Member
 
Join Date: Dec 2004
Posts: 1
Default How to find out the encrytion algorithim for a software.

Hi all,

Currently I have the serial number and the security code to unlock the software. Does anyone knows how can i know the encrytion algorithim in it? Any software for that?

Example:

Serial No. 9339
Security code. 7238272

How to know the encrytion code between it. Thank you all.

Rdgs
sgpiggybank
Reply With Quote
  #2  
Old 12-09-2004, 10:13 AM
Devine9 Devine9 is offline
Administrator
 
Join Date: Dec 2002
Posts: 180
Default

Well you've gotta pull apart the software and find out how its working. That's the whole idea. Visit #cracking4newbies on efnet and http://krobar.cjb.net perhaps, if you want a starting place.

cheers,

Devine Right [RET]
Reply With Quote
  #3  
Old 12-11-2004, 02:59 AM
codebreaker codebreaker is offline
Member
 
Join Date: Oct 2004
Posts: 12
Default

thats the 1,000,000$ question .

Find the protection -> understand it -> destroy it -> drink beer 8)

some people mix the order though :shock:

more good websites : http://www.yates2k.net/ , http://its.mine.nu/
__________________
*"Carpe Noctem"
*"Crackers don't sleep, They idle"
[img]http://www.geocities.com/crackingil/ree.jpg[/img]
Reply With Quote
  #4  
Old 12-11-2004, 11:26 AM
Acid_Cool_178 Acid_Cool_178 is offline
Member
 
Join Date: Dec 2002
Location: Planet Earth
Posts: 35
Default

yet another good web site: www.reteam.org
Reply With Quote
  #5  
Old 12-12-2004, 11:40 AM
sna sna is offline
Administrator
 
Join Date: Jun 2003
Posts: 76
Default

infinite recursion :cry:
Reply With Quote
  #6  
Old 06-18-2005, 05:01 AM
GEEK GEEK is offline
Member
 
Join Date: Jun 2005
Posts: 5
Default

1. disassemble it

2. study the code

thts it.
Reply With Quote
  #7  
Old 08-05-2005, 05:19 PM
Darawk Darawk is offline
Junior Member
 
Join Date: Aug 2004
Posts: 4
Default

The first thing you should do is run the PEiD plugin "Krypto Analyze" on it. You can get PEid just about everywhere, and the stock plugins are accessible from the little "->" button in the bottom right. Krypto Analyze will search for cryptographic "signatures", which usually means unique large numbers that are used by various algorithms. If this doesn't get you what you're looking for, i'd suggest searching the file for xor's with differing operands. An xor operation with non-identical operands that isn't crypto or compression related is very rare in my experiences(i've only seen it used in one type of tricky compiler optimization...the specifics of which I can't recall at the moment, and then the odd explicit use of it by the programmer for control-flow, though that is VERY rare). If you still come up empty-handed, then your best bet is to set a memory breakpoint on the input data, and just wait for it to be accessed by the crypto code.
Reply With Quote
Reply


Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump





Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2021, Jelsoft Enterprises Ltd.