Reverse Engineering RET Homepage RET Members Reverse Engineering Projects Reverse Engineering Papers Reversing Challenges Reverser Tools RET Re-Search Engine Reverse Engineering Forum Reverse Engineering Links

Go Back   Reverse Engineering Team Board > Reverse Engineering Board > .NET Reverse Engineering
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Reply
 
Thread Tools Display Modes
  #11  
Old 06-16-2009, 08:03 PM
Andu Andu is offline
Member
 
Join Date: Apr 2008
Posts: 46
Default

Quote:
Originally Posted by LibX View Post
Ok Andu has some more work todo before its perfect ;p
You mean I have to search for another protection tool then... :P

Edit: Well, I took a look at the 'decrypted' CrackMe in Reflector and it crashes in most methods. Did you only decrypt the important sections Kurapica?

Also I don't think that this scenario can be compared to a real application where an assymetric key would be used so the cracker would need to manipulate the executable (license checks or stored public key). I'm wondering how hard it would be to produce a patched exe that actually runs. So another cracking challenge with .Net Reactors inbuild keyfile protection would be nice

Last edited by Andu : 06-16-2009 at 08:19 PM.
Reply With Quote
  #12  
Old 06-17-2009, 04:18 AM
LibX LibX is offline
Administrator
 
Join Date: Feb 2007
Location: The Netherlands
Posts: 118
Default

Quote:
Originally Posted by Andu View Post
You mean I have to search for another protection tool then... :P
Ow please just cut the bullshit

If ur where smart you would contact one of the people here and pay him a big pile of money to realy improve ur shit accept of posting one terribly failed protection system attempt after another.
You really dont see that we are laughing our asses off here?
Reply With Quote
  #13  
Old 06-17-2009, 06:38 AM
FarJump FarJump is offline
Member
 
Join Date: Jun 2009
Posts: 14
Default

I have checked the extracted assembly of Kurapica, and as I already mentioned before, all methods in the main form are empty... completely missing my (simple) validation code. I suspect Kurapica and kao used a debugger to 'catch' the code directly. In case you are forced to patch it (asymmetric encryption...) it is certainly a completely different chellange. Damn I should have name this babe "patchme". :-)
Reply With Quote
  #14  
Old 06-17-2009, 07:47 AM
kao kao is offline
Senior Member
 
Join Date: Sep 2007
Posts: 184
Default

Quote:
Originally Posted by FarJump View Post
as I already mentioned before, all methods in the main form are empty...
I fail to find that post of yours. Which one you are referring to?

Talk is cheap. If you wanted to test a real-life scenario, you should have done that in first place. Or you can do it now by making a new unpackme/patchme.
Reply With Quote
  #15  
Old 06-17-2009, 10:59 AM
Andu Andu is offline
Member
 
Join Date: Apr 2008
Posts: 46
Default

+1 for creating another crackme with build in protection (assymetric) or patchme cause it's a completely different kettle of fish
Reply With Quote
  #16  
Old 06-17-2009, 01:01 PM
FarJump FarJump is offline
Member
 
Join Date: Jun 2009
Posts: 14
Default

OK, here is my new crackme. Now you are forced to patch it. Hopefully you need more than 10-20 minutes this time! :-)

http://www.mediafire.com/?xal0mhjbym2
http://rapidshare.com/files/24561070...kMe_2.rar.html

@kao
I wrote "I have tried this way but the relevant methods are empty."

Last edited by FarJump : 06-17-2009 at 01:05 PM.
Reply With Quote
  #17  
Old 06-17-2009, 03:45 PM
Kurapica Kurapica is offline
Senior Member
 
Join Date: May 2006
Location: Archives
Posts: 357
Default

There is nothing new in Reactor except the new necrobit update where the original MSIL code is encrypted and not placed somewhere naked in the file, anyway it won't be so hard to restore the code after decryption.

@FarJump : Do you work for andu too ?
__________________
Life can only be understood backwards but It must be read forwards.
Reply With Quote
  #18  
Old 06-17-2009, 05:27 PM
FarJump FarJump is offline
Member
 
Join Date: Jun 2009
Posts: 14
Default

I don't really care about most differences and I'm not particular interested in nerobit. I'm mainly interested in preventing my soft from any manipulation and NR does the best job for me so far. Show me I'm wrong and patch my new crackme. It can't be so hard, right? Btw, neither I work for andu nor for someone else.
Reply With Quote
  #19  
Old 06-19-2009, 08:26 AM
Andu Andu is offline
Member
 
Join Date: Apr 2008
Posts: 46
Default

Just curious... has anybody made any progress in cracking this?
Reply With Quote
  #20  
Old 06-19-2009, 05:08 PM
LibX LibX is offline
Administrator
 
Join Date: Feb 2007
Location: The Netherlands
Posts: 118
Default

Quote:
Originally Posted by Andu View Post
Just curious... has anybody made any progress in cracking this?
Didnt take a look at it, but if you want a ton of free security advice to make this product of yours something usefull PM me, iam kinda sick of this cat and mouse game just want to get it over with
Reply With Quote
Reply


Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump





Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2019, Jelsoft Enterprises Ltd.