Exetools  

Go Back   Exetools > General > General Discussion

Notices

Reply
 
Thread Tools Display Modes
  #1  
Old 08-10-2003, 20:56
dynio
 
Posts: n/a
Exclamation How to become a solid cracker (Advices for beginners).txt

Last days I'm receiving pretty often messages and mails with the same question: "what do I have to do to be skilled reverser/cracker, what tools do you use?". Well, there is no golden rule . I suppose it's composed by three elements: WORK, WORK and... WORK. Anyway, if someone is it still wondering where she/he should begin, please read these advices.

A set of must have tools:
LordPE - PETools - PEExplorer - ProcessExplorer - Revirgin - ImportRec - Advanced Registry Tracer - SoftSnoop - ApiMonitor - FileMon - RegMon - Spy&Capture - ResourceHacker - ResourceTuner - ResourceBuilder - OllyDbg - W32Dasm - SoftIce - IDA - Dede - EnhancedDebugger (it's GREAT) - BDasm - Debuggy - HexEditor - WinHex - UltraEdit - Med - MASM (remember to update link.exe and ml.exe from VS NET) - TASM - packers/unpackers - any C++ compiler (Borland, Microsoft, DJGPP...).

Tutorials:
TKC - Fravia - +ORC - Iczelion - manual unpacking (aspack, asprotect, telock, armadillo, etc.) - dongle removing (envelope, dumping...) import table rebuilding - exceptions - adding visual functions to any program - Assembly Style - Art of Disassembly - Opcodes help - Intel Pentium Instrucions Reference - PC Assembly Language (it's GREAT) - Art of Assembly Programming (yes, it's HUGE but there's no need to read it all, 20-30% is enough) - Windows API - Codebreakers - The Assembler Environment - PE Format Explained (or other good PE tutorials).

Cryptography:
First of all, cryptography knowledge doesn't make You much stronger in cracking. It can make You more serious in reversing and protecting. I know that most of You are discouraged when hear about MD5 IDEA RC4 etc. Believe me, in the beginning You don't need it. Just try to ask any SKILLED cracker what is a "collision", what does "Floyd's cycle finding algo" do, what's faster: MD4 or MD5?, what MD5, SHA and RIPEMD have in common? These are only few principles of cryptography. Not to blame these crackers - I can bet 95% of them doesn't know the correct answer just because they don't need it at all. As a proof let's take Armadillo and ExeShield. Both of them use STRONG CRYPTOGRAPHY but in order to full crack them You need (I'm assuming the amount of time) about 3-7 hours for Arma and 1-2 hours for ExeShield. Why? Only because cryptography is less important. The real power is hidden in antidebug antidump and antitrace tricks and that's what You should have learn . Ok. let's stop it as it begins turning into a tutorial and we don't need it.
Titles: - Handbook of Applied Cryptography - Cryptography Theory and Practice.

I hear You all.... "What this jerk is talking about?! That would take 80% of my free time! I've no willingness for these stupidities! I want to become famous! NOW!... ". Well, then go and masturbate urself in some public toilet or start singing with Britney Spears. If You want to become famous then You're in a wrong place -there is no space here to explain why. If You'll read and understand the mentioned titles and provide Yourself with this software, You should become more than an average cracker -You should be ON THE TOP. Then, someday, I'll be glad to have the chance to ask You for help.

Please remember that all You've read above is only my private opinion. I hope that helped at least one solid and honest furthcoming scene member (to be truthful: I'm not scene member ). Greetings and regards to all the people visiting ExeTools forum (especially the pleasant ones: Wassim and Jay .
Reply With Quote
  #2  
Old 08-10-2003, 21:50
Lunar_Dust
 
Posts: n/a
Well said In the end, all it really takes is a lot of READING and WORK.

-Lunar
Reply With Quote
  #3  
Old 08-10-2003, 21:58
an0nymous
 
Posts: n/a
..omg

time - that is all what you need

trust me..
Reply With Quote
  #4  
Old 08-17-2003, 09:01
Katrin
 
Posts: n/a
Talking a beginner is no winner (yet)!

Hey dynio,
why don't you prepare a 'beginner's package' in which you include all your tuorials and then upload it. Think would be nice and fun. Greetings.
Reply With Quote
  #5  
Old 08-17-2003, 18:36
MaRKuS-DJM's Avatar
MaRKuS-DJM MaRKuS-DJM is offline
Cracker + Unpacker
 
Join Date: Aug 2003
Location: Virtual World / Network
Posts: 553
Rept. Given: 7
Rept. Rcvd 6 Times in 4 Posts
Thanks Given: 3
Thanks Rcvd at 16 Times in 10 Posts
MaRKuS-DJM Reputation: 6
yes, time is all you need... and sometimes help from professional crackers. and of course much tutorials
Reply With Quote
  #6  
Old 08-17-2003, 20:38
uban
 
Posts: n/a
why not crypto thread ?

Why not open a crypto thread here, where the expirienced "decrypter" would share their basic and advanced technics with the curious ones ?
Reply With Quote
  #7  
Old 08-17-2003, 21:06
ArC ArC is offline
VIP
 
Join Date: Jan 2003
Location: NTOSKRNL.EXE
Posts: 172
Rept. Given: 0
Rept. Rcvd 1 Time in 1 Post
Thanks Given: 5
Thanks Rcvd at 17 Times in 12 Posts
ArC Reputation: 1
Quote:
...where the expirienced "decrypter" would share...
Experianced Decrypter?
Reply With Quote
  #8  
Old 08-18-2003, 15:38
dynio
 
Posts: n/a
Tutorials

OK guys, I'm glad to hear some of You have found it useful. About tools: I'm not sure all the tools I'm using are free to distribute but if You have strong reasons... why not?
Get ready for cryptographic intro I'll post during 1-2 days. I've chosen ExeShield as a target because it uses Rijndael, SHA and MD5. Moreover it's protected with Xtreme Protector. Yeah, I was a bit surprised too. As far as I know, Xtreme Protector is the hardest one, so prepare for a lot of fun.
I could post it today, but during writing, it has growed to more than 20kb! I must cut out the Xprotector subject because it's too big, and the way I've played with it was not so birght (I don't think You want to write a SoftIce macro which patch over 100 bytes).
What You'll get is a cryptographic intro which will show You the way the most popular algorithms are working (the principles) and how keygenrators are builded. After reading You will be able to keygenerate ExeShield without touching it's code or changing anything inside the file .

Regards.
Reply With Quote
  #9  
Old 08-18-2003, 18:08
dj-siba's Avatar
dj-siba dj-siba is offline
Musician Member
 
Join Date: Jun 2003
Location: Outside the dot
Posts: 324
Rept. Given: 34
Rept. Rcvd 43 Times in 21 Posts
Thanks Given: 56
Thanks Rcvd at 159 Times in 43 Posts
dj-siba Reputation: 42
Thumbs up

dynio: Thanks for you time, and to all who wrote tuts...

Regrads
Reply With Quote
  #10  
Old 08-19-2003, 00:56
ArC ArC is offline
VIP
 
Join Date: Jan 2003
Location: NTOSKRNL.EXE
Posts: 172
Rept. Given: 0
Rept. Rcvd 1 Time in 1 Post
Thanks Given: 5
Thanks Rcvd at 17 Times in 12 Posts
ArC Reputation: 1
Did you break Xtreme-Protectors protection?

A about that would be nice

Isn't that strange? Someone protects his *OWN* protector
with *ANOTHER* protector by another company?



[I know I already asked this in
the Software Release forum.
Why do you think that it is protected with
Xtreme-Protector?]

Last edited by ArC; 08-19-2003 at 01:35.
Reply With Quote
  #11  
Old 08-19-2003, 16:16
dynio
 
Posts: n/a
Xtreme Protector

Hehe, as I said: v2.8a is Xtreme protected. I'm sure because I've spend few hours dancing with this protector (over 100 patched bytes LIVE inside the code). Be ready... And I agree with You, I was a bit surprised too (protecting a protector with another competitive protector).

Regards.
Reply With Quote
  #12  
Old 08-19-2003, 21:38
ArC ArC is offline
VIP
 
Join Date: Jan 2003
Location: NTOSKRNL.EXE
Posts: 172
Rept. Given: 0
Rept. Rcvd 1 Time in 1 Post
Thanks Given: 5
Thanks Rcvd at 17 Times in 12 Posts
ArC Reputation: 1
That's strange.....

Every Xtreme-Protector app contains the
following things:
  • at least one section which is named XPROT (ok..the section can be renamed easily)
  • the message: "Cannot write Xprotector.vxd. Make sure that this file is not being used by another program
  • you can find: Xprotector.sys XPROTECTOR \\.\XPROTECTOR \\.\Global\XPROTECTOR
  • you can find some APIs for installing drivers.
  • You can find the text: "Xtreme-Protector Error Xtreme-Protector Cannot open XPROTECTOR.SYS driver. Please, make sure that you have administrator's permits the first time that you are going to run this program Cannot open XPROTECTOR.VXD driver. Make sure that XPROTECTOR.VXD is not open by another program Xprotector driver has been updated, you need to restart your computer to finish the installation of the driver. Do you want to restart your computer now?"

These messages are ALWAYS put into a Xprot
app no matter what protection options you
choose.

However, I couldn't find ANY of the things
mentioned above

I also bypassed the s-ice detection
by simply loading icedump.

That's neither possible with the first release
(1.0) nor with the current version (1.05)
(of Xtreme-Protector)

Xtreme-Protector does NOT allow you to turn
off debugger detection.

Sorry..but I'm a bit confused....

Last edited by ArC; 08-19-2003 at 21:52.
Reply With Quote
  #13  
Old 08-19-2003, 21:56
ArC ArC is offline
VIP
 
Join Date: Jan 2003
Location: NTOSKRNL.EXE
Posts: 172
Rept. Given: 0
Rept. Rcvd 1 Time in 1 Post
Thanks Given: 5
Thanks Rcvd at 17 Times in 12 Posts
ArC Reputation: 1
However, I'm looking forward to your
tutorial
Reply With Quote
  #14  
Old 08-20-2003, 02:22
uban
 
Posts: n/a
Great deal

Sounds like a great deal, Dynio. Go on!
Reply With Quote
  #15  
Old 08-20-2003, 15:09
dynio
 
Posts: n/a
My, oh my...

Arc: How often do I need to write the same words? Check this out: exeshield homepage . Download the file.
You are right about vxd/sys/envelope etc. The problem is You are playing with old version of ExeShield. And forget about any SoftIce hidding tools and tricks. THEY DOESN'T WORK WITH XTREME PROTECTOR. It was some fun for me to rip the ExeShield 2.8 code.
Bad news: I wouldn't write a solution for XProtector because I know they are reading this forum. As I've written in other previous posts: I don't want to learn them.
I've finished the tutorial, but it's explaining protection scheme (MD5) in ExeShield 2.8 - not the XProtector itself. All what I can tell You about XProtector is: it's not so hard to turn it off during work. The only problem was to find the incovex ideas (not these well known). I've found three methods to skip this protector.
As I would like to help as much as I can I'm open to help You all with certain applications protected with XProtector (dump, reverse, disassemble...). Also if You're interested in some fragments of XProtector feel free to ask me.

Regards.
Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off


Similar Threads
Thread Thread Starter Forum Replies Last Post
Some advices on dll memory patching please Annibal General Discussion 1 08-18-2006 00:42


All times are GMT +8. The time now is 00:04.


Always Your Best Friend: Aaron, JMI, ahmadmansoor, ZeNiX, chessgod101
( 1998 - 2024 )