#31
|
|||
|
|||
How come? I haven't seen anything protected by it. Or is it cause nooby is your "best friend" ?
Ditto, i haven't seen anything in the "wild" protected by it, only some people claiming that it's adequate. Quote:
Off the record, nico is long since gone from SR. Quote:
Quote:
Might be dead, but can you crack it? WL/Themida and Execryptor are the most popular for apps and they have been completely owned... by few. |
The Following 3 Users Gave Reputation+1 to For This Useful Post: | ||
progopis (09-16-2009) |
#32
|
|||
|
|||
Agreed..... how the hell can NoobyProtect be considered strong when theres sod all out there to look at??
If its really that good there would be no problem chucking out some protected files to show off its strength. At the moment it just talks the talk with out even taking its first steps, let alone walking the walk. Thats no disrespect to Nooby, its merely a statement of fact. Having said that, NoobyProtect is employing by far the safest 'protection' and that is limited distribution of 'non-demo' versions. If the code aint there, it aint going to be cracked (although carding then becomes the problem). The only way VB Decompiler was beaten was because the code was made available. Even using some of the better protectors it was then beaten by someone who had put the time in to learn. |
The Following User Gave Reputation+1 to Loki For This Useful Post: | ||
progopis (09-17-2009) |
#33
|
|||
|
|||
Quote:
It's VM is the only thing that's decent everything else is lazy coding. As for noobyprotect, I've only seen the demo. And it was not very impressive. But I could be wrong. |
#34
|
||||
|
||||
My assumptions of NoobyProtect are based on ahmadmansoor overview and comments:
http://forum.exetools.com/showthread.php?t=12446 I have been very busy and haven't even looked into it. Keep in mind, these were my personal opinions of protections based on experience(s) with them. The derogatory tones in some of your comments aren't necessary. If you have a different opinion then please feel free to share it.
__________________
Even as darkness envelops and consumes us, wrapping around our personal worlds like the hand that grips around our necks and suffocates us, we must realize that life really is beautiful and the shadows of despair will scurry away like the fleeting roaches before the light. |
#35
|
|||
|
|||
Wibu Codemeter is another uncrackedable at this time - I guess!
|
#36
|
|||
|
|||
Wibu CodeMeter is crackable. Just look around.
|
#37
|
|||
|
|||
'uncrackable' ?
I will have to say that we have a piece of software that uses a wicked combination of the following:
-Sentinel 7.5 USB Key *PLUS* -CrypKey 6.1 It appears that the main exe for the program was obfuscated, and I rack my brain trying to kill the combination of these, while leaving the program in a working condition. I am able to remove the Sentinel from earlier versions, but there's something funky with the Crypkey integration with it. Other than those, I am from a much older generation of 'cracking', and what you kids do now just amazes and impresses me! |
#38
|
|||
|
|||
Yeah crypkey is nice.. Though doable, just something that needs a bit of time..
Mostly due to lack of documentation. Quote:
Me wonders what the generation time is.. |
#39
|
||||
|
||||
> But I suppose that has always been the case
Yep, JMI and I learned from the Bletchley Park work Git |
#40
|
|||
|
|||
Hehe I wouldn't be surprised if you guys knew Alan Turing from back then.
|
#41
|
|||
|
|||
I had a bash at NoobyProtect last night. I must say very good protection even from the demo version.
My Olly Breakpoints "BP MessageBoxA" did not work on the NoobyProtect'ed target. Well Done Nooby, going to be playing more... |
#42
|
|||
|
|||
Without dongle access and Enveloped, is it cracked-able?!
|
#43
|
|||
|
|||
Why do you ask? Anyway, it is.
|
#44
|
|||
|
|||
Because I have one of this kind and also asked some reversers and they always ask dongle to do
|
#45
|
|||
|
|||
This would be very interesting if it were true.
Without access to the dongle which usually contains the decryption key, one would have only two choices: 1. bruteforce, 2. give up. Unless the implementation uses DES or some damn weak encryption, then it becomes interesting. Do you mind to shed some more light over here, Syoma? |
Thread Tools | |
Display Modes | |
|
|
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
When use "vendor defined encryption routines", how to set daemon related part? | bridgeic | General Discussion | 6 | 01-22-2015 11:35 |
Wlscgen: Are "Vendor Id" and "Developer Id" different ? | Numega Softice | General Discussion | 6 | 02-12-2007 18:12 |