Thursday 30 October 2014

BL0G ZeR0 SiXXXXXX

 BL0G ZeR0 SiXXXXXX

Assembler Language crackme!

 BL0G ZeR0 SiXXXXXX



 Hello there once again. I'm playing around with assembly stuff as I wrote in 'BL0G ZeR0 0nE '. I thought I'd try out a really easy Assembly Language Crackme from: http://crackmes.de [You have to register to get any goods] . I opened up W32dsm [You can find out about it here: W32DASM ] Looked at the Exe file opened up the  youtube  how to [They were using ollydbg but W32dsm does the same stuff.] I watched the video then after a while figured it out . I'm soo special! :)


I didn't do the keygen part. Short version of it: I debugged it, [LaFarge's crackme #2 from: http://crackmes.de/users/lafarge/lafarges_crackme_2/] loaded the list of string data items, went to a 'push' loaded the process, toggled the breakpoint, ran it, put in 'name' for the username and wrote '666' for the reg. code, got the error I wanted, played around with it for a bit, looked at the 'Hex display of data object/segments, got this:


:00406940 00 00 00 00 00 00 00 00 ........
:00406948 00 36 36 36 00 00 00 00 .666.... <--This was my reg. code in the Hex display
:00406950 00 00 00 00 00 00 00 00 ........

:00406540 00 00 00 00 00 00 00 00 ........
:00406548 00 33 35 36 38 33 30 37 .3568307 <--This is the actual reg. code that magically appeared
:00406550 38 33 35 00 00 00 00 00 835.....
:00406598 00 00 00 00 00 00 00 00 ........

At first I got:
username: name
reg. code: 3568239718


Then I tried it again for fun and to make sure it sank in and got this:
username: duck
reg. code: 3568307835

Ohhhh yeeeaaah I learned about Assembly language debugging crackme crap! Can't wait to learn more. Here are some links for you if you want to check it out:

wiki reverse engineering
Crackme How to
Tutorial W32Dasm
Cruehead CrackMe Tutorial
Disassemblers and Decompilers

That concludes yet another fun filled BL0G. I'm off to do more computer crappage. See yah next time thanks for reading. :)  .

No comments:

Post a Comment