Exetools  

Go Back   Exetools > General > General Discussion

Notices

Reply
 
Thread Tools Display Modes
  #1  
Old 01-16-2004, 21:02
MaRKuS-DJM's Avatar
MaRKuS-DJM MaRKuS-DJM is offline
Cracker + Unpacker
 
Join Date: Aug 2003
Location: Virtual World / Network
Posts: 553
Rept. Given: 7
Rept. Rcvd 6 Times in 4 Posts
Thanks Given: 3
Thanks Rcvd at 16 Times in 10 Posts
MaRKuS-DJM Reputation: 6
Asprotect 1.23 New Tutorial by LaBBa

i saw LaBBa wrote a new tutorial for Asprotect 1.23, but he didn't post it @exetools...

so i'll attach it here.
many thanks to LaBBa!!!!

original post by LaBBa:
Quote:
This is it ..
the final tut..
i just hope that more ppl will start writing tuts in a good old : "Step by Step"

I just hope that ppl that wont appreciate this tut at least will appreciate the time it took me to write it..

Best Regard to all ,

LaBBa

Last edited by MaRKuS-DJM; 01-16-2004 at 21:05.
Reply With Quote
  #2  
Old 01-16-2004, 22:06
britedream britedream is offline
Friend
 
Join Date: Jun 2002
Posts: 436
Rept. Given: 0
Rept. Rcvd 0 Times in 0 Posts
Thanks Given: 0
Thanks Rcvd at 7 Times in 7 Posts
britedream Reputation: 0
Hi Markus
asprotect dosn't need that long tut, eventhough we appreciate the effort now and always that labba is doing, I think long tut tend to be hard to follow at least for me,here is the way that britedream might do it:
1- stack hard breakpoint on the first push, takes you to pushad, do the same for the pushad takes you to the stolen bytes.
2- memory breakpiont on code section, look at the stack for the oep.
3- fix your iat- done.

Last edited by britedream; 01-19-2004 at 00:54.
Reply With Quote
  #3  
Old 01-16-2004, 22:49
MaRKuS-DJM's Avatar
MaRKuS-DJM MaRKuS-DJM is offline
Cracker + Unpacker
 
Join Date: Aug 2003
Location: Virtual World / Network
Posts: 553
Rept. Given: 7
Rept. Rcvd 6 Times in 4 Posts
Thanks Given: 3
Thanks Rcvd at 16 Times in 10 Posts
MaRKuS-DJM Reputation: 6
yes, you are right, but it's interesting how many ways takes you to the finish

some question. which hardware-breakpoint do you use? the second one @the pushad doesn't work for me.
Reply With Quote
  #4  
Old 01-16-2004, 22:53
MaRKuS-DJM's Avatar
MaRKuS-DJM MaRKuS-DJM is offline
Cracker + Unpacker
 
Join Date: Aug 2003
Location: Virtual World / Network
Posts: 553
Rept. Given: 7
Rept. Rcvd 6 Times in 4 Posts
Thanks Given: 3
Thanks Rcvd at 16 Times in 10 Posts
MaRKuS-DJM Reputation: 6
no, got it handled already

thanks britedream

but i see stack-breakpoints won't work on ASProtect 1.22 - 1.23 Beta 21

Last edited by MaRKuS-DJM; 01-16-2004 at 23:02.
Reply With Quote
  #5  
Old 01-16-2004, 23:21
britedream britedream is offline
Friend
 
Join Date: Jun 2002
Posts: 436
Rept. Given: 0
Rept. Rcvd 0 Times in 0 Posts
Thanks Given: 0
Thanks Rcvd at 7 Times in 7 Posts
britedream Reputation: 0
may I ask which program?
Reply With Quote
  #6  
Old 01-16-2004, 23:23
R@dier
 
Posts: n/a
I was wondering if you guys could please expand on

Quote:
1- stack hard breakpoint on the first push, takes you to pushad, do the same for the pushad takes you to the stolen bytes.
I dont quite understand it


Best Wishes
R@dier
Reply With Quote
  #7  
Old 01-16-2004, 23:30
britedream britedream is offline
Friend
 
Join Date: Jun 2002
Posts: 436
Rept. Given: 0
Rept. Rcvd 0 Times in 0 Posts
Thanks Given: 0
Thanks Rcvd at 7 Times in 7 Posts
britedream Reputation: 0
f7 to pass the push, follow esp to dump,
right click on it in the dump, select : hardware on access dword.
Reply With Quote
  #8  
Old 01-16-2004, 23:47
MaRKuS-DJM's Avatar
MaRKuS-DJM MaRKuS-DJM is offline
Cracker + Unpacker
 
Join Date: Aug 2003
Location: Virtual World / Network
Posts: 553
Rept. Given: 7
Rept. Rcvd 6 Times in 4 Posts
Thanks Given: 3
Thanks Rcvd at 16 Times in 10 Posts
MaRKuS-DJM Reputation: 6
it's advanced im password recovery by elcomsoft, protected by the old asprotect, and the stack hardware-bp doesn't work

correction:
the first one works, the second one: no

Last edited by MaRKuS-DJM; 01-16-2004 at 23:51.
Reply With Quote
  #9  
Old 01-17-2004, 00:17
R@dier
 
Posts: n/a
@ britedream
Thanks :-)


@ MaRKuS
I have been playing with advanced im password recovery also,
after you posted it this mornin, found it quite easy to unpack using the differnt methods.



Best Wishes
R@dier

Last edited by R@dier; 01-17-2004 at 00:26.
Reply With Quote
  #10  
Old 01-17-2004, 00:25
MaRKuS-DJM's Avatar
MaRKuS-DJM MaRKuS-DJM is offline
Cracker + Unpacker
 
Join Date: Aug 2003
Location: Virtual World / Network
Posts: 553
Rept. Given: 7
Rept. Rcvd 6 Times in 4 Posts
Thanks Given: 3
Thanks Rcvd at 16 Times in 10 Posts
MaRKuS-DJM Reputation: 6
and which method did you use R@dier?
Reply With Quote
  #11  
Old 01-17-2004, 00:30
R@dier
 
Posts: n/a
to find OEP used
2- memory breakpiont on code section,

to find stolen bytes used kinda LaBBa's method

I still have not got the hang of

Quote:
1- stack hard breakpoint on the first push, takes you to pushad, do the same for the pushad takes you to the stolen
yet,

but looking into it :-)

R@dier
Reply With Quote
  #12  
Old 01-17-2004, 00:45
britedream britedream is offline
Friend
 
Join Date: Jun 2002
Posts: 436
Rept. Given: 0
Rept. Rcvd 0 Times in 0 Posts
Thanks Given: 0
Thanks Rcvd at 7 Times in 7 Posts
britedream Reputation: 0
for the advance:
the method is correct, but somehow it
didn't catch the bp, it erased the breakpoint, but eventhough I brought it
back it still wouldn't catch it, you can work around it by the following:
you will notice when you passed the pushad
that esp = 12 ffa4 , it should have poped up
when it has been accessed, but it did not , so once you are at the last exception, set trace condition esp==
12ffa4, then control+f11 it will stop on top of the stolen byte as it should have, f7 little bit you should be at the first one.

Last edited by britedream; 01-17-2004 at 02:14.
Reply With Quote
  #13  
Old 01-17-2004, 00:55
britedream britedream is offline
Friend
 
Join Date: Jun 2002
Posts: 436
Rept. Given: 0
Rept. Rcvd 0 Times in 0 Posts
Thanks Given: 0
Thanks Rcvd at 7 Times in 7 Posts
britedream Reputation: 0
to find the oep:
at the stolen bytes or the last exception,
set memory breakpoint on the code section,once stoped, look at the stack (K on the tool bar), if you see two addresses take the second one, if one, take it, if no address then oep is just above where you are.
Reply With Quote
  #14  
Old 01-17-2004, 02:43
MaRKuS-DJM's Avatar
MaRKuS-DJM MaRKuS-DJM is offline
Cracker + Unpacker
 
Join Date: Aug 2003
Location: Virtual World / Network
Posts: 553
Rept. Given: 7
Rept. Rcvd 6 Times in 4 Posts
Thanks Given: 3
Thanks Rcvd at 16 Times in 10 Posts
MaRKuS-DJM Reputation: 6
hm, i used trace, but the trace always hangs in an endless loop. i don't know why, but it happens only for this aspr-version (beta 21).
the code-bp is a method for OEP
Reply With Quote
  #15  
Old 01-17-2004, 02:50
MaRKuS-DJM's Avatar
MaRKuS-DJM MaRKuS-DJM is offline
Cracker + Unpacker
 
Join Date: Aug 2003
Location: Virtual World / Network
Posts: 553
Rept. Given: 7
Rept. Rcvd 6 Times in 4 Posts
Thanks Given: 3
Thanks Rcvd at 16 Times in 10 Posts
MaRKuS-DJM Reputation: 6
but no problem, i got it handled with F8 & F7 to skip the unpacking-routine (which is for some reason endless with tracing) and after this i ran trace. All stolen bytes are plain-text *lol*
Reply With Quote
Reply

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off


Similar Threads
Thread Thread Starter Forum Replies Last Post
Still need help with Asprotect Pompeyfan General Discussion 98 03-22-2004 20:20


All times are GMT +8. The time now is 20:15.


Always Your Best Friend: Aaron, JMI, ahmadmansoor, ZeNiX, chessgod101
( 1998 - 2024 )