downloadbrowsederoko's brainbuster

Download brainbuster.zip, 8 kb (password: crackmes.de)
Browse contents of brainbuster.zip

Objective is to write keygen or to get good pass for .rar , just check readme.1st.txt

Hapy cracking and brainbusting

Difficulty: 3 - Getting harder
Platform: Windows 2000/XP only
Language: Assembler

Published: 29. Oct, 2005
Downloads: 1180

Rating

Votes: 10
Crackme is nothing special.

Rate this crackme:

Send a message to deroko »

View profile of deroko »

Solutions

Solution by lord_Phoenix, published 09. nov, 2005; download (55 kb), password: crackmes.de or browse.

lord_Phoenix has rated this crackme as boring crap.

Submit your solution »

Discussion and comments

born2c0de
29. Oct 2005
Smart coding there.
Disassemblers think the Strings are pieces of Code. Nicely masked with MessageBox Functions.
Also includes a INT 3 Debug Interrupt instruction.
Neat.
I got through the main code...i jus hate the math...
deroko
Author
29. Oct 2005
that small part of "math" is there so I could sumbit it as crackme. I was more interested in way of tracing code and breaking it down instead of serial calculation which is not hard =)
deroko
Author
29. Oct 2005
@bigboss : If you have solved it(which I doubt) please submit solution and don't give hints that I gave at one serbian forum prior to writing this crackme...
bigboss1988
29. Oct 2005
Am sorry deroko :(

but i asked only
code_inside
29. Oct 2005
Ok i've cracked it :)
The stuff you use in the beginning is almost the same as my TrapMe CrackMe :) (Which sadly only runs on W98SE...)
I'll PM the name+serial.
deroko
Author
29. Oct 2005
good job mate,
algo for "the stuff" you can find on my hp and it works quite good under win2k/xp =)
bigboss1988
30. Oct 2005
Hi deroko

i see 2 trick now ;)

patch allow for tricks ?
deroko
Author
30. Oct 2005
sure you may patch whatever you want to get good key, but don't make jmp to good message as I've expalined in readme.1st.txt =)
bigboss1988
30. Oct 2005
ok deroko i made it ;)

i still searching key :)
bigboss1988
31. Oct 2005
Any hint :D

i can't get pass
deroko
Author
31. Oct 2005
did you find keycheck routine?
bigboss1988
31. Oct 2005
yes,

004010E6 . BF F1204000 MOV EDI,brainbur.004020F1 ; ASCII "bigboss1988"
004010EB . F3:AB REP STOS DWORD PTR ES:[EDI]
004010ED . B9 19000000 MOV ECX,19
004010F2 . BF 55214000 MOV EDI,brainbur.00402155 ; ASCII "1111111111111"
004010F7 . F3:AB REP STOS DWORD PTR ES:[EDI]
004010F9 . 6A 1E PUSH 1E ; /Count = 1E (30.)
004010FB . 68 F1204000 PUSH brainbur.004020F1 ; |Buffer = brainbur.004020F1
00401100 . 6A 00 PUSH 0 ; |ControlID = 0
00401102 . FF75 08 PUSH DWORD PTR SS:[EBP+8] ; |hWnd
00401105 . E8 F4080000 CALL <JMP.&USER32.GetDlgItemTextA> ; \GetDlgItemTextA
0040110A . 85C0 TEST EAX,EAX
0040110C . 0F84 97010000 JE brainbur.004012A9
00401112 . 83F8 05 CMP EAX,5
00401115 . 0F82 8E010000 JB brainbur.004012A9
0040111B . A3 EE214000 MOV DWORD PTR DS:[4021EE],EAX
00401120 . 6A 1E PUSH 1E ; /Count = 1E (30.)
00401122 . 68 55214000 PUSH brainbur.00402155 ; |Buffer = brainbur.00402155
00401127 . 6A 01 PUSH 1 ; |ControlID = 1
00401129 . FF75 08 PUSH DWORD PTR SS:[EBP+8] ; |hWnd
0040112C . E8 CD080000 CALL <JMP.&USER32.GetDlgItemTextA> ; \GetDlgItemTextA
00401131 . 85C0 TEST EAX,EAX
00401133 . 0F84 70010000 JE brainbur.004012A9

----------------------------->
bigboss1988
31. Oct 2005
00401152 21CA AND EDX,ECX
00401154 BE DF9F204D MOV ESI,4D209FDF
00401159 BE DF9F3216 MOV ESI,16329FDF
0040115E 98 CWDE
0040115F 3216 XOR DL,BYTE PTR DS:[ESI]

-------------->process terminated??

that's all
code_inside
31. Oct 2005
bigboss1988,

That's not the key checking routine, you're stuck at the second protection (TrapFlag Decryption), pay attention to the SEH that has been set up ;)
bigboss1988
01. Nov 2005
code_inside :(

i can't slove it
submit ur solution i wanna know something nwe ;)
MaxM
04. Nov 2005
Damn! I reopened the cm in IDA and found the tl.cbk -I TOTALLY forgot to check its presence w/LordPE - I took it very bad when Olly exited at start anyway lol
By the way, since I don't want to deal with the uncrypting stuff, is there any way to crack without debugging? Eventually reversing some very curious routine around...
MaxM
04. Nov 2005
sigh!
I'll patch and start debuggin to track the ref i miss.
(ps: change the t-stuff in txxx in my prev post, to make it more obscure, or just remove it -at will)
deroko
Author
04. Nov 2005
that's okay no need to delete post =) happy cracking =)
MaxM
04. Nov 2005
@bigboss: check the prior crackme of deroko, the #2 (august one). It uses the same tecnique of this one, just simplified (btw, you can find a ref to it in the paper on SEH i posted on community, search for the Jr IBM in it)
lord_Phoenix
07. Nov 2005
i solved it =)
soon i'll submit a solution..
bigboss1988
11. Nov 2005
thx MaxM

lord_Phoenix solved it ;)

very nice crackme deroko
lord_Phoenix
11. Nov 2005
very very nice crkme ;)
deroko
Author
12. Nov 2005
=) tnx guys I hope that evrybody have learnt what is the purpose of tls callback here and how it works =)
lord_Phoenix
12. Nov 2005
yep tls here is the main thing in protection =)
deroko
Author
12. Nov 2005
yap a little knwoledge about debugging is required =) how does olly stop at ep? also you could just erase tls from de in oh =)
cheers
lord_Phoenix
12. Nov 2005
most curious thing is ur nanomitez
deroko
Author
05. Dec 2005
I've decided to post full src(inc/engines) here it is :
hxxp://deroko.headcoders.net/brainbuster/

You may leave your comment, thoughts and discuss this crackme with other reversers here.
Acting childish will not be tolerated.
HTML and such will be left as-is, so don't try.