|
[活动]春节大礼包,《看雪论坛精华23期》发布!
春节快乐! |
|
[转帖]求助]SENTEMUL 2007加載的DNG文件有時間限制
你先要搞清楚,是用了正版的SENTEMUL 2007造成的,还是DNG license有日期限制。 你先用EDGE破解的SENTEMUL 2007再说。 ============================================= _ _____ ______\ _____ _ _____ ._/ \\___/._\ \ _/ __/__._/ \\___/ | __/__| \__ \ \\ \ __/___. Living on the EDGE | _/ : / / _/ / _/ | <-------|__\_______________/|________/|__\_______|-----------------------------> RELEASE NAME ..... SoftKey Solutions SENTINEL Emulator 2007 *FIXED* SUPPLIER ......... Team EDGE CRACKER .......... Team EDGE PROTECTION ....... RSA-512, RC6, MD5, Custom, Obfuscation. RELEASE DATE ..... 24/10/2007 SIZE ............. 1 x 5MB URL .............. http://www.neobit.org/ <------------------------------------------------------------------------------> PRODUCT DESCRIPTION SoftKey Solutions SENTINEL Emulator 2007 *FIXED* There was a stupid bug in the dumper that prevented dumping and solving of sentinel keys with certain driver versions. This has been fixed, we would like to thank Git and whyIII from the exetools forum for bringing this to our attention. And now, enjoy a fully working version! Well this release is something special, cEnginEEr and Team EDGE joined forces to do this one. This is a very good commercial dongle emulator, but we do really not like commercial crackers, so we thought it was time to liberate this. On its own, this emulator is not worth much, so we include Sentinel solver that solves to the .dng format utilized by this thing. This release featured massive work, over several weeks, solving the 512 bits RSA key, debugging the drivers in ring-0, analyzing file formats, coding tools and making it all work together. / Team EDGE signing off... neoBit company has been working in field of reverse engineering since 1998 and specializes in making software copies of hardware keys. Dongle is a small electronic device responsible for software authorization. Neobit works with following dongle brands only: HASP 3, HASP 4, HASP HL and HardLock by Aladdin Knowledge Systems, Sentinel SuperPRO/PRO/CPlus/Scribe by Rainbow (now Safe-Net Inc). There are many disadvantages and threats for dongles: - Dongle is a piece of hardware which can be lost. - There's a large market for second hand software and dongles. That's the reason of great quantity of dongle thefts. - Fired workers or competitors steals hardware keys making harm to your business. - As any electronic device, dongle can die. Main features of Dongle emulator from neoBit: - 100% software emulation of HASP3, HASP4, Hardlock FAST E-Y-E, Rainbow Sentinel SuperPRO, Pro, CPlus, Scribe. - Highly reliable code tested by thousands customers. - Transparent for other dongles. - Single and Unlimited licenses. - Pro version with advanced license control. - Easy-to-use user-friendly interface. - Works under Microsoft Windows 95 / 98 / ME / NT / 2000 / XP / 2003. <------------------------------------------------------------------------------> INSTALLATION INSTRUCTIONS 1. Unzip and Unrar. 2. Make sure you have the latest Sentinel dongle drivers installed. 3. To dump and solve make sure the original Sentinel key is connected to a LPT or USB port then Run EDGESPRO11.EXE in the EDGE dir. 4. Select the Sentinel tab, choose a filename for the result .dng file, and press "Dump&Solve". This can take some minutes depending on what type and how many algorithms needs to be recovered. The "Specify Developer Id" and "Specify Write Password" options are for advanced users, and not required. "Specify Developer Id" allows you to dump and solve from emulators without physical dongle. "Specify Write Password" allows you to dump faster, if you know cell 4 (write password). 5 Now run SENTEMUL2007.EXE, go to the "Driver" tab, and press "Install" button and if installation was successful driver status window will be changed to: "Status : driver is installed". 6. Now you need to open "Emulator" tab, Then you press "Start Service" button. If everything is ok you'll see "SENTINEL Emulator Service is running" 7. Open "Dongles" tab and press the "Load dump" button, then navigate to the .dng file you created with EDGESPRO11.EXE 8. Enjoy! <------------------------------------------------------------------------------> WE ARE DEDICATED TO QUALITY, NOT QUANTITY, AND WE ARE DOING IT FOR THE LULZ! <------------------------------------------------------------------------------> |
|
[求助]UPX 脱壳后再运行程序,程序会自动修复
呵呵,很多破解是放在UPX壳里的,脱壳后,反而变成原版。这是一种保护破解的手段。 解决方法很简单,不要脱壳,用OD载入,一步步执行,然后走到大量循环的阶段,这时是在往00401000解压原始代码。在循环结束的地方,就可以看到patch内存的代码,就是做破解的劳动成果了,记录下来。 最后,在脱了壳的程序里,按刚刚的记录修改,就完成了破解。 |
|
[原创]解决载入(打开)加壳程序后,OD关闭退出的问题
你们都是高手啊,弱弱问一句,为什么不用OD attach进线程看呢。 曾经碰到一个程序,现象正好相反,serv-u用OD载入调试,运行很正常,独立运行程序5分钟内必定退出。后来attach进去发现里面有IsdebugPresent函数,接下来就知道该干什么了。 |
|
[讨论]禁止Windows Preinstallation Environment(WinPE)(再次更新思路具体到编程方法)
硬盘逻辑锁的代码在硬盘引导区上,开机自举加锁就要改BIOS了,就是要写micro code了。有个工具Phoenix BIOS Editor可以改改模块选项,还有一个俄罗斯的工具BIOS Patcher可以改改AWORD BIOS。总之BIOS这东东是分厂商,不开放的,所以没参考文档自己搞是很难弄的。有的还需要硬件工具平台。看到一个网站有些相关内容http://www.rebios.net 。 |
|
[求助]借鸡生蛋
请详细指点工具和步骤 |
|
[求助]借鸡生蛋
还需要学习,搞定后结贴酬谢各位。 |
|
|
|
[求助]借鸡生蛋
检查过,是的,扫描鼠标、键盘事件的代码。 00401620 . 8B4424 08 mov eax, dword ptr [esp+8] 00401624 . 83E8 10 sub eax, 10 ; Switch (cases 10..111) 00401627 . 0F84 9D010000 je 004017CA 0040162D . 2D 00010000 sub eax, 100 00401632 . 56 push esi 00401633 . 57 push edi 00401634 . 0F84 EC000000 je 00401726 0040163A . 83E8 01 sub eax, 1 0040163D . 75 58 jnz short 00401697 0040163F . 0FB74424 14 movzx eax, word ptr [esp+14] ; Case 111 (WM_COMMAND) of switch 00401624 00401644 . 83E8 01 sub eax, 1 ; Switch (cases 1..2) 00401647 . 74 1B je short 00401664 00401649 . 83E8 01 sub eax, 1 0040164C . 75 49 jnz short 00401697 0040164E . 50 push eax ; /lParam; Case 2 of switch 00401644 0040164F . 50 push eax ; |wParam 00401650 . 8B4424 14 mov eax, dword ptr [esp+14] ; | 00401654 . 6A 10 push 10 ; |Message = WM_CLOSE 00401656 . 50 push eax ; |hWnd 00401657 . FF15 70314100 call dword ptr [413170] ; \SendMessageA 0040165D . 5F pop edi 0040165E . 5E pop esi 0040165F . 33C0 xor eax, eax 00401661 . C2 1000 retn 10 而且在401620上面下了断点,如果是修改前的版本用OD跟踪(另外一个地址)会发现载入主界面或重绘的时候这个断点在不停的中断,企图抓取所有的鼠标键盘事件。但修改后此断点还未运行到,就出错跳到ntdll里面了。 |
|
[原创]反破解技巧 - 随机密码
就是通过降低程序效率来获得破解难度。如果N是个大数,这个程序一辈子都运行不了 |
|
|
|
[分享]serv-u ftp服务器密码暴力破解工具
原来是猜ServUDaemon.ini文件中用戶的password啊,可是很少有人用純數字的做密碼。 倒是編個正向加密工具有用,即把明文密碼變成ServUDaemon.ini中的加密串。 |
|
[分享]serv-u ftp服务器密码暴力破解工具
请问LZ这是破serv-u的什么密码? |
|
[求助]加密程序的工具
不要破解玩多了,看谁都是贼。 那些拿自己或别人的东西卖钱的,如果定价不公道,都是JS,强烈BS! 我这里加密的目的是为了控制发布,只在需要的人中间使用,更不想让拷贝成了JS赚钱的工具。 来看雪只想学习、讨论技术问题,但前面能给予指点的朋友甚少,看来还是要自己动手才能丰衣足食。现在正泡在工具下载页面里,一个个试验过来,感觉Armadillo对过期的设置方法还不尽人意,续期不知道如何实现;EXECryptor的过期再激活的功能很好,可惜没有提前通知的功能;ACProtect不知道为什么出来的东东不大稳定;ASProtect正在试验中。 |
操作理由
RANk
{{ user_info.golds == '' ? 0 : user_info.golds }}
雪币
{{ experience }}
课程经验
{{ score }}
学习收益
{{study_duration_fmt}}
学习时长
基本信息
荣誉称号:
{{ honorary_title }}
能力排名:
No.{{ rank_num }}
等 级:
LV{{ rank_lv-100 }}
活跃值:
在线值:
浏览人数:{{ visits }}
最近活跃:{{ last_active_time }}
注册时间:{{ user_info.create_date_jsonfmt }}
勋章
兑换勋章
证书
证书查询 >
能力值