
-Oky.'s WxProtect v1.0 Crackme
Download WxProtect_CrackMe.zip, 44 kb (password: crackmes.de) Browse contents of WxProtect_CrackMe.zip The official crackme for the WxProtect protector which was written for a university project.
Difficulty: 2 - Needs a little brain (or luck) | Send a message to -Oky. » View profile of -Oky. » |
Solutions
Solution by ala_borbe, published 18. jan, 2007; download (64 kb), password: crackmes.de or browse.
ala_borbe has rated this crackme as quite nice.
Solution by ReHPer, published 18. nov, 2006; download (123 kb), password: crackmes.de or browse.
ReHPer has not rated this crackme yet.
Solution by znycuk, published 10. apr, 2006; download (92 kb), password: crackmes.de or browse.
znycuk has rated this crackme as quite nice.
Discussion and comments
l0calh0st 31. Mar 2006 | Thanks...too easy ;) |
---|---|
toshimi 31. Mar 2006 | mmm.. it seems simple... |
l0calh0st 31. Mar 2006 | Do we need to make a keygen...??? |
HMX0101 31. Mar 2006 | Very nice crackme, its uses some fpu functions... Great!, thanks! |
-Oky. Author 31. Mar 2006 | Thanks, I’m glad you enjoyed it. The main aim of the crackme was to defeat the protector so a keygen is not necessary although it would be more than welcome. Very impressed with the speed you reverse it!, I'll try and make it harder next time ;) |
red477 31. Mar 2006 | but what keygen,i could find only one key :D |
-Oky. Author 01. Apr 2006 | Just had another look at the key verification routine and your right, it does seam to produce the same key for similar input and even if you enter completely different input, it still doesn't change a lot :( I remember writing it off the top of my head very late a night and with no intention of it being analyzed, sorry. The application it’s-self was written quite quickly and simply, just so I could (legally) demonstrate how software was reversed. The whole idea was you had this extremely vulnerable app that the protection could make secure :) |
zairon Moderator 01. Apr 2006 | Yes you're right, it's easy but... (imho) it's a nice introduction to the unpacking world. I would expect some detailed tutorials and not the usual annoying 'load the file in olly, dump the file, rebuild....'. Try to answer to some questions: - What about the IAT? Write something about import table desctruction, iat rebuilding - Is there an hash checking? - Is there an encryption? - Are there some anti-disassembly and anti-debugging tricks? Good luck. |
ReHPer 19. Nov 2006 | hahaha... for 0/10 |
Zaphod 20. Nov 2006 | Oky and red477, I don't understand what you mean when you say there is only one key. Different names DO generate different keys... |
You may leave your comment, thoughts and discuss this crackme with other reversers here.
Acting childish will not be tolerated.
HTML and such will be left as-is, so don't try.