downloadbrowseHMX0101's Keygenme #5

Download keygenme#5.zip, 30 kb (password: crackmes.de)
Browse contents of keygenme#5.zip

=====================
HMX0101's Keygenme #5
=====================

This is my new crackme, with a couples
of antidebugging tricks and crypto-modified
plus a special trick.

To beat this crackme, you need:

- Analyze the algo
- Remove the timer
- Make a keygen
- Write a tutorial

Rules:

- Patching the goodboy jump not allowed.

==========
Greets to:
==========

Shub-Nigurrath, Taliesin, monkey, TDC, Linden,
_khAttAm_, l0calh0st, Ox87k, Ank83, TWiST, dila,
moofy, ScR1pT_, KLiZMA, Kerberos, R.E.M,
CracksLatinos, and all members in crackmes.de

Difficulty: 4 - Needs special knowledge
Platform: Windows 2000/XP only
Language: Unspecified/other

Published: 19. May, 2006
Downloads: 654

Rating

Waiting for at least 3 votes
(we have only 2).

Rate this crackme:

Send a message to HMX0101 »

View profile of HMX0101 »

Solutions

There are no solutions to this crackme yet. Have you solved it? Please write a tutorial and submit it here!

Submit your solution »

Discussion and comments

HMX0101
Author
26. May 2006
Nothing can't crack this?, i think its very easy :D
if somebody need hints, maybe i can help...
Ank83
26. May 2006
Hi HMX0101.
How are u ? It was a while since a cracked something, and this one looks difficult to me, but I will try it.
So my question is: Can this crackme load in Olly ?
Best Regards
Ank83
HMX0101
Author
26. May 2006
Yes, check the crackme using a PE Editor :D
Ank83
26. May 2006
I just don't see what to change ! Need some help !
Regards
Ank83
l0calh0st
26. May 2006
Ank83 ...you only need to change the "no. of RVA and sizes"...Mostly it should be 10
Ank83
26. May 2006
yeap it working...
thank l0calh0st
it's nice to see you all, again.
bundy
06. Jun 2006
First some code fragment with my comments. I apologize if it gets wrong formated.

003D4FE6 mov esi,003D6100 ; some sort of crc table
......
003D5011 |shr ecx,14 ; get high 12 !!! bites
003D5014 |mov ecx,[dword esi+ecx*4] ; access AWAY!! of the crc table
......
003D5033 |shr edx,19 ; 7 bites ?!?
003D5036 |mov edx,[dword esi+edx*4] ; crc table not fully used :(
003D5039 |shl ebx,15 ; this could be accepted
......
003D5049 mov eax,80
003D504E /mov edx,ebx
003D5050 |shr edx,18 ; corretly in my point of view - 8 bites left
003D5053 |mov edx,[dword esi+edx*4]
003D5056 |shl ebx,13
003D5059 |xor edx,ebx
003D505B |mov ecx,[local.1] ; remember 80h <= eax < 101h
003D505E |movzx ecx,[byte ecx+eax-2] ; reference to company + eax - 2 - hmm, what's there????
003D5063 |xor edx,ecx ; some data on heap
003D5065 |mov ebx,edx
003D5067 |inc eax
003D5068 |cmp eax,101
003D506D \jnz short 003D504E
003D506F mov ecx,[local.2]

Well, the main problem the way I see it, is that there is access out of data section.
Mostly there is access into .reloc section - if it would be into .code section
I would see it as a sort of crc checking, which would be fine with me.
The second thing is this access into the heap after company name - do we miss
here some modulo? :)

I honestly don't think anyone of these fragments is this mentioned "special trick".
I would call them "bugs".

If I oversaw something or I'm completly wrong give me some hint, on the other
side, I would correct this wrong access "behaviour".
HMX0101
Author
06. Jun 2006
The algo used for check the CRC32, can make different hashes, but after a long time... maybe its a bug, but i don't think so.

Try to make a keygen, and you see if that points are true...

You may leave your comment, thoughts and discuss this crackme with other reversers here.
Acting childish will not be tolerated.
HTML and such will be left as-is, so don't try.