A forum for reverse engineering, OS internals and malware analysis 

Discussion on reverse-engineering and debugging.
 #11438  by Flamef
 Sun Feb 05, 2012 1:03 am
I was trying to crack this "CrackMe",i can't understand how it works,i think i found the serial procedure but can't understand it.
Any help?Also explain me how you did it?
Attachments
No password :D
(2.58 MiB) Downloaded 46 times
 #11439  by R00tKit
 Sun Feb 05, 2012 6:58 am
very easy

sample valid serial
j364567V90k239e69ht
it also save serial in
HKEY_CURRENT_USER\ThiseasKeyProtection
key
 #11441  by Flamef
 Sun Feb 05, 2012 4:41 pm
Thanks!
How did you do that?Can you explain me?
Btw i found the HKEY_CURRENT_USER\ThiseasKeyProtection but it doesn't really help,just a file there with no value.
 #11448  by Flamef
 Sun Feb 05, 2012 6:37 pm
Xylitol wrote:Have a look here
Image
Lol,i am not retarted xD,i went there using text strings.I set a breakpoint at the abd message but it seems that serial phising didn't work and i am a bit of stucked now.Any explnation?:p
 #11451  by Flamef
 Sun Feb 05, 2012 7:38 pm
I guess this is the algorithm,which i can't understand :D .
This is the only way i know,serial phising.I mean,all tut's i've read is about serial phising,or via comparisons(Getdlgitemtexta).Anyway this is c++ so.... :shock: