View Full Version : something different
MP
March 10th, 2001, 13:45
i have one application. I think it is VB3. Because when debugged with win32dasm, in the beginning it shown vb300.dll. Then in the string data it shows as per the following.
" Combst"
" Demle"
" nes lees 8 iegCe "
"(5I>"
"(5Iz"
"@!-j"
"\pred_eng.mdb"
"25I42"
"2a5I"
"5I48"
"5Iz8ffffff"
"7m716"
"8!-@*P"
"AB8G"
"ASHWIN"
"ee Je<e& o"
"en ueive peerJeve kes"
"ENGLISH [ENG]"
"er leeje "
"g77!!-"
"g77!"
"H=5I"
"hD!-"
"I!-,"
"I48pX"
"Lagna (Body,Health)"
"MARATHI"
"rKI>"
"Simha"
"Times New Roman"
"vNp3"
"XI!-n.P"
"XI=8"
"Zdp3YB"
Further the software requires key diskett to run it. I want to break disk checking. I am a newbie hence guide me in the matter.
disker
March 10th, 2001, 23:31
If a program asks for a key diskette, the diskette is probably formatted in an unusual way that the operating system copy functions would no understand and copy. The protection will have to read the disk in an "unconventional" way.
Look for the instruction INT13 in the code of the program or the dlls. INT13 is the BIOS interrupt that access the disk devices at low level. It is unusual to find this instruction inside the regular code of an application . There is a chance that the protection is around the call(s) to this interrupt.
MP
March 12th, 2001, 09:59
I checked the vbrundll.300. It was in the same programme folder. Hence i disassembled it but unable to find the reference for int 13. Can u guide me further?
disker
March 12th, 2001, 10:12
Quote:
MP (03-12-2001 06:59):
I checked the vbrundll.300. It was in the same programme folder. Hence i disassembled it but unable to find the reference for int 13. Can u guide me further? |
Sorry if I missguided you before. What I meant you should dissassemble are the code and the dll specific to the program. not the visual basic library. VB probably access the disks in a conventional way: using the Windows API functions. But, inside of the program or libraries, the programmers should have a piece of code that reads the disk in a non-standard fashion ie, without using regular windows API, or VB ready-made routines, for that matter. Int13 is the BIOS service that is able to perform such task.
MP
March 13th, 2001, 10:53
I read cracking tutorial about int13 by Specular vision. He has mentioned to use PC-Watch to get the reference. It can be set to look for any type of BIOS call. I am not able to get PC-Watch and hence cannot porceed further. Can u help me to move further.
Sorry for trouble.
MP
bAZiK
March 13th, 2001, 15:12
If you want it as easy, as possible, goto google and search for "DoDi". He's written a decompiler for VB3 ;-)
MP
March 14th, 2001, 14:02
I downloaded the vb decopiler from dodi. the txt file is in german. after installation the programme is asking for registration.
Solomon
March 15th, 2001, 01:50
Hi,
You can get the VB3 decompiler from CrackZ's site: zencrack2.cjb.net.
Seems that this decompiler needs VB to be installed. So install VB5/VB6 first.
Powered by vBulletin® Version 4.2.2 Copyright © 2018 vBulletin Solutions, Inc. All rights reserved.