#1
|
|||
|
|||
Armadillo questions?
What is the Armadillo protection system? How does it work?
How does Skamer from Dream Team break Armadillo protection system? Is this implementation failure? Or is this weak cryptography algorithm used in Armadillo? Where can I know more details about Armadillo protection system? |
#2
|
|||
|
|||
Why not goto the Armadillo website and read there propaganda? If you want to learn about it theres tuts on unpacking it, releases of it etc.
No other grp other than dT has ever keygenned Armadillo to my knowlege and there not to willing to say how they did it, as that wold be a give away to Chad and the rest of the Arma Developers. |
#3
|
|||
|
|||
ManSun, you can find more information on Armadillo's forum: http://support.siliconrealms.com/
|
#4
|
|||
|
|||
But
but, there are only general uselesness informations...;-/
|
#5
|
|||
|
|||
ManSun,
I don't think it's a matter of weak cryptographic algorithm. Software protection against cracking has not much to do with cryptographic algorithms....my sister, without cryptographic knowledge, could wait till the program is decrypted in memory and user LordPE do dump the decrypted program in memory About the rest of your question...maybe you should give more details about what you want to know exaclty, and not asking that general question that could be answer in Armadillo's help |
#6
|
|||
|
|||
What cryptography algorithms does use Armadillo and what keys a dyn!o and other talking about??? (Skamer made keygenerators for Armadillo, but he didin't dump decrypted parts from memory....my brother ;>)
|
#7
|
||||
|
||||
Hi there!
"I don't think it's a matter of weak cryptographic algorithm." Well, keygenerating relies in the most part in the cryptography but the software protection itself doesn't have to deal with cryptography only and it's rather about anti-***, anti-*** etc. stuff. What I want to say? I mean that Armadillo keygeneration was caused only by a silly bug which was now solved (I am still very surprsied why so late). What algo Arma uses? ECC. What that gives us? Nothing beacause this time the settings and binary material were carefully chosen so don't waste your time brothers. Does that make Armadillo uncrackable? No, it makes it unkeygenable Good luck, dyn!o |
#8
|
|||
|
|||
to peleon
with all my respects, in armadillo with copymem2, if you wait till program is full decrypted in memory you wait eternally, never is full decypted in memory, the father process copy only 1000 bytes in the child process, execute this 1000 bytes and erase this 1000 bytes, copy other 1000 bytes execute and erase, never the target is full decrypted, the solucion is force the farher decrypt all and next beggining to execute, but is not a work for my sister, jeje is a hard work, and next you can fight with the nanomites, when you have the full program dumped, not run by nanomites (INT3), the jmps of the original program was replaced by INT3, and you can determine, what jump are (conditional or jmp) if jump or not jump ,and where jump, if you put your sister to make this work, you are a bad brother, jeje.
Ricardo |
#9
|
|||
|
|||
lol, point taken. I wont make my sis do it
|
#10
|
|||
|
|||
Thanks for any information!
Yes dump program in memeory is hard-work because it is many antycracking-trick (anty-dissasembler, anty-debugger, anty-trace, dummy-opcodes, relocation, embedded-code and other) easier is carded program but is not the same |
#11
|
|||
|
|||
hehehe, thanks for the info Ricardo and for being so kind with sisters
Well, I was talking a bit about software protection in general. I read in a forum that one shareware author was asking why programs can be cracked when you have unbreakable cryptographic algoritms out there. Many programmers don't realise that to crack a program you dont need to have knowledge about cryptographic, just use other simpler ways (dump, rebuild IAT...). So, the shareware author was talking about his posibilities of programming a cryptographic algorithm in his program and that was the perfect software protector against cracking in general. (he was far from the reality ) |
#12
|
|||
|
|||
perfect
i understand, and you have reason.
Sorry for my bad english. Ricardo Narvaja |
#13
|
|||
|
|||
If one uses the cryptographic process to protect certain functions in the software, which will not decrypt, and therefore not operate unless the proper code is entered and they have used a strong encryption "properly", it is not likely that one can get a fully functioning software unless one is capable of writing the missing elements. While this depends on the proper choice of the functions to protect, it is a fairly effective protection system. The problem is that the shareware software vendors seem not to impliment these features in their programs. This is a common problem of those who fail to use asprotect to its full potential. While I'm less familiar with the choices offered arma users, I would suspect that they,also, often fail to use its capabilities to their full potential, leaving aside the issue of the incorrect implimentation of the earlier cryptographic systems which was actually arma's error.
Regards,
__________________
JMI |
#14
|
|||
|
|||
Hi JMI,
Yes, you are right and that's a good way to protect. Though that protection way is not applicable to all kind of software (like when you have to release a COMPLETE version of your program but with trial limits). Anyway, shareware authors can do a lot more from his source code like that encryption scheme that you talked about....Programmers seem very lazy for that and they just complain when it's cracked in a few days |
#15
|
|||
|
|||
As a general rule, the only way to actually protect a trial software is to NOT make it complete. If you make it complete and give a timelimit, some enterprising cracker is going to figure out how to remove the time limit. Afterall, it has to have a check stored somewhere. Even having it check the software companies computer can be tricked. If one can keep the debugger running and has enough patience, it can be found and defeated.
Again, just a general observation. Regards,
__________________
JMI |
Thread Tools | |
Display Modes | |
|
|
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
PE Loader Questions | dila | General Discussion | 13 | 12-20-2011 12:03 |
2 questions about hasp | suddenLy | General Discussion | 3 | 01-12-2005 01:51 |
2 questions (IDA / Windows 2k/2k3) | skyper | General Discussion | 8 | 04-22-2004 08:44 |
some unpacking questions | gnasher | General Discussion | 2 | 01-03-2004 20:44 |