Reverse Engineering RET Homepage RET Members Reverse Engineering Projects Reverse Engineering Papers Reversing Challenges Reverser Tools RET Re-Search Engine Reverse Engineering Forum Reverse Engineering Links

Go Back   Reverse Engineering Team Board > Reverse Engineering Board > .NET Reverse Engineering
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Reply
 
Thread Tools Display Modes
  #1  
Old 12-13-2009, 04:32 PM
SweetZ SweetZ is offline
Junior Member
 
Join Date: Dec 2009
Posts: 4
Default CrackMe [Observational]

Ive put together a little crack me.

If/Once your past HWID Protection, try to crack the password.

http://www.megaupload.com/?d=C1AKEPSY
Reply With Quote
  #2  
Old 12-14-2009, 04:47 AM
Kurapica Kurapica is offline
Senior Member
 
Join Date: May 2006
Location: Archives
Posts: 357
Default

What's the point of another SmartAssembly CrackME !!?
__________________
Life can only be understood backwards but It must be read forwards.
Reply With Quote
  #3  
Old 12-14-2009, 06:40 AM
Kurapica Kurapica is offline
Senior Member
 
Join Date: May 2006
Location: Archives
Posts: 357
Cool Try this

Anyway It was not hard but rather boring....

Copy the 2 files in the archive and run loader.exe from the CrackME folder, then you can use any string as a correct PWD.
Attached Files
File Type: zip Archive.zip (5.6 KB, 22 views)
__________________
Life can only be understood backwards but It must be read forwards.
Reply With Quote
  #4  
Old 12-14-2009, 08:16 AM
SweetZ SweetZ is offline
Junior Member
 
Join Date: Dec 2009
Posts: 4
Default

Quote:
Originally Posted by Kurapica View Post
Anyway It was not hard but rather boring....

Copy the 2 files in the archive and run loader.exe from the CrackME folder, then you can use any string as a correct PWD.
How exactly did you do this?
Reply With Quote
  #5  
Old 12-14-2009, 08:33 AM
sirp sirp is offline
Senior Member
 
Join Date: Apr 2008
Posts: 76
Default

cool approach karapica ! btw sweet .. u have to find the bytes responsible for the good / bad jumps .. and with a loader u can patch em in memory without breaking strongnaming etc .. caus the key is used for encrypt / decrypt. u could wirte your own loader too or use dup or something like that

Last edited by sirp : 12-14-2009 at 08:36 AM.
Reply With Quote
  #6  
Old 12-14-2009, 09:18 AM
SweetZ SweetZ is offline
Junior Member
 
Join Date: Dec 2009
Posts: 4
Default

Quote:
Originally Posted by sirp View Post
cool approach karapica ! btw sweet .. u have to find the bytes responsible for the good / bad jumps .. and with a loader u can patch em in memory without breaking strongnaming etc .. caus the key is used for encrypt / decrypt. u could wirte your own loader too or use dup or something like that
So, i couldnt use this protection on my product that will be going on sale soon? I dont want it to get cracked, and you seemed to do it very easily.
Reply With Quote
  #7  
Old 12-14-2009, 09:52 AM
kao kao is offline
Senior Member
 
Join Date: Sep 2007
Posts: 184
Default

@SweetZ: look around this board, you'll learn 2 things very quickly.

First, anything that runs can be broken. If your product is worth it, it will be cracked sooner or later. Just accept it as a fact.
Second, Kurapica is one of the top .NET reversers in the world. He can break virtually any .NET protection. But your real worries should be beginners and medium-level reversers and {smartassembly} is good enough to stop them.

Software protection is similar to keys of your house. Great locksmith will be able to open standard locks in a few seconds or minutes. But the locks are good enough to stop majority of criminals, therefore we still use them.
Reply With Quote
  #8  
Old 12-14-2009, 10:55 AM
SweetZ SweetZ is offline
Junior Member
 
Join Date: Dec 2009
Posts: 4
Default

Quote:
Originally Posted by kao View Post
@SweetZ: look around this board, you'll learn 2 things very quickly.

First, anything that runs can be broken. If your product is worth it, it will be cracked sooner or later. Just accept it as a fact.
Second, Kurapica is one of the top .NET reversers in the world. He can break virtually any .NET protection. But your real worries should be beginners and medium-level reversers and {smartassembly} is good enough to stop them.

Software protection is similar to keys of your house. Great locksmith will be able to open standard locks in a few seconds or minutes. But the locks are good enough to stop majority of criminals, therefore we still use them.
Thankyou very much for that, i didnt know he was that good hehe.

So is {smartassembly} good enouph to protect my program from low-mid level crackers? It also has my HWID implemented too.
Reply With Quote
  #9  
Old 12-14-2009, 12:22 PM
Kurapica Kurapica is offline
Senior Member
 
Join Date: May 2006
Location: Archives
Posts: 357
Default

lol kao !! Thanks for the nice words coz It really made my day

and as kao already said, SA is an excellent protection that can stop most beginners and medium-level reversers, personally I use it.
__________________
Life can only be understood backwards but It must be read forwards.
Reply With Quote
  #10  
Old 12-14-2009, 11:25 PM
bball0002 bball0002 is offline
Senior Member
 
Join Date: Mar 2009
Posts: 72
Default

Nice approach Kurapica. Personally that is what I do for apps protected with {SmartAssembly} 4, because if the "References Dynamic Proxy" setting is enabled then it is very hard to directly edit the exe (although NOT impossible).

To the OP, if I were you I would go with either {SmartAssembly} or DeployLX Codeveil 3.2. Codeveil is also a very nice protector that will stop most beginner - average reversers. DeployLX also has a licensing system which is very nice.
Reply With Quote
Reply


Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump





Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2021, Jelsoft Enterprises Ltd.