Exetools  

Go Back   Exetools > General > Community Tools

Notices

Reply
 
Thread Tools Display Modes
  #1  
Old 10-27-2019, 00:44
CodeCracker CodeCracker is offline
Family
 
Join Date: Jun 2011
Posts: 272
Rept. Given: 16
Rept. Rcvd 238 Times in 66 Posts
Thanks Given: 12
Thanks Rcvd at 900 Times in 203 Posts
CodeCracker Reputation: 200-299 CodeCracker Reputation: 200-299 CodeCracker Reputation: 200-299
PCGuardKeygen - PCGuard key tool

PCGuardKeygen - PC Guard key tool
PC Guard V6/v5 DEMO keygen is able to:
1. Generate button:
Generate "Activation Code" for PC Guard,
serials are generated from "Program ID" and "Site Code" (HID)
2. Decode button
Decode "Program ID" from "Activation Code" and "Site Code" (HID)
3. Verify button
Verify "Activation Code" and "Site Code" is required,
Not too strong check since just check 1 CRC32 byte.
4. Brute Site button
Decode "Program ID" from "Activation Code" while "Site Code"
is brute forced; SiteCollection.binary is generated containing
"Site Code"+" "+"Program ID"+0D0A (last is newline termination)
This will not test if "Program ID" is valid, a new tools has
to be created for that task.

"Program ID" has 24 hexadecimal numbers length (3 dwords)
"Site Code" has 8 hexadecimal numbers length (1 dword)
"Activation Code" is like: 7000074C-9598DD6C-78CBB23F-EF0156B4

https://www.calculateme.com/time/minutes/to-days/
Expected time for 4. Brute Site button would be approximately 4 hours.
Attached Files
File Type: zip PCGuardKeygen_src_VC6.zip (45.9 KB, 37 views)
File Type: zip PCGuardKeygenExe.zip (6.6 KB, 36 views)
Reply With Quote
The Following 5 Users Gave Reputation+1 to CodeCracker For This Useful Post:
conan981 (10-28-2019), DCA (11-06-2019), Mahmoudnia (10-27-2019), niculaita (10-27-2019), wilson bibe (10-27-2019)
The Following 17 Users Say Thank You to CodeCracker For This Useful Post:
Apuromafo (10-27-2019), Avi_RE (11-14-2019), besoeso (10-28-2019), bolo2002 (10-27-2019), cachito (10-29-2019), canopus (10-29-2019), conan981 (10-28-2019), DCA (11-06-2019), flightwatch (10-29-2019), Kurapica (10-27-2019), Mahmoudnia (10-27-2019), niculaita (10-27-2019), nikkapedd (10-28-2019), NoneForce (10-28-2019), squareD (11-14-2019), wilson bibe (10-27-2019), zeuscane (10-27-2019)
  #2  
Old 11-14-2019, 02:19
CodeCracker CodeCracker is offline
Family
 
Join Date: Jun 2011
Posts: 272
Rept. Given: 16
Rept. Rcvd 238 Times in 66 Posts
Thanks Given: 12
Thanks Rcvd at 900 Times in 203 Posts
CodeCracker Reputation: 200-299 CodeCracker Reputation: 200-299 CodeCracker Reputation: 200-299
Some info on how you could modify this to also work for Full version:
seems that under full version the only different thing is a dword which come after site_code:

uint32_t ToBeHashed[2];
ToBeHashed[0] = site_code; // we need site code for decoding
ToBeHashed[1] = 0xA264D581; // this should be changed

You should grab it from target program:
Here is the first PC Guard check serial length:
009CA211 83F9 23 CMP ECX,23
009CA214 9C PUSHFD
009CA215 EB 01 JMP SHORT 009CA218

and this will move in eax the dword which should be fixed:
009CA74F 8B85 10B74100 MOV EAX,DWORD PTR SS:[EBP+41B710]
009CA755 60 PUSHAD
009CA756 E8 03000000 CALL 009CA75E
009CA75B 83EB 0E SUB EBX,0E
009CA75E EB 01 JMP SHORT 009CA761
How you should trace PC Guard: if you are after the actual check you should set a breakpoint before where current call get called; - restart Olly (not bother on trying to fallow jumps), you will also see some loop: just set breakpoint on exit door.
Reply With Quote
The Following User Gave Reputation+1 to CodeCracker For This Useful Post:
Mahmoudnia (11-14-2019)
The Following 2 Users Say Thank You to CodeCracker For This Useful Post:
kallegaul (11-14-2019), Mahmoudnia (11-14-2019)
Reply

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



All times are GMT +8. The time now is 05:28.


Always Your Best Friend: Aaron, JMI, ahmadmansoor, ZeNiX