Mfriend
December 12th, 2002, 20:10
Hi
I'm quite new to RE ( about ~1/2 year ) and have found a very intersting target. Advanced Softice detection ( frogice, ntall, icedump, various anti-debugging tricks, aso.
I'm pretty sure that the programmer ( some shareware author ) does not protect his software with "custom" tricks ( except CRC checking )
- after some manual unpacking strings like "yoda" appeared in the dumped exe=> he uses more than one packer.
But the real interesting part follows:
The target is one single exe ~ 1 Mb size. Dumped process is 60 Kb. This 60 kbyte ( I'm not finished with all the packer layers ) appears to be only some Loader/Unpacker for the real software which is encrypted in the 1 Mb exe file ( after the process image ).
Guessing OEP for each layer is quite hard for me.. are there any other "generic" ways to recognize an OEP ?
( the only one I know of, and which appears on this board too is:
POPAD
RET )
Well, and building up IT... I don't really know when I'm correct.. for some reason the target quits itselfe without any error - even with a complete messed IT.. ( perhaps I've missed some CRC/size check )
Now - does anyone of the grand-crackers have an idea which protection this could be ? Reminds me somehow of "Himan 2" (securom v2. + "special tricks"
where some dlls and other program parts are built up in memory by the encrypted executable.
I have spent nearly an hour ( maybe too less )into looking for tutorials which explains how to crack multiple protected targets. Does anyone know of some resources I should look into, before I start asking questions here ?
I have to admit.. I prefere to find it out by myself.. but this finding out has cost me nearly 2 weeks by now - and I really don't know if I'm on the right track ( unwrapping layer by layer ).
I'm quite new to RE ( about ~1/2 year ) and have found a very intersting target. Advanced Softice detection ( frogice, ntall, icedump, various anti-debugging tricks, aso.
I'm pretty sure that the programmer ( some shareware author ) does not protect his software with "custom" tricks ( except CRC checking )
- after some manual unpacking strings like "yoda" appeared in the dumped exe=> he uses more than one packer.
But the real interesting part follows:
The target is one single exe ~ 1 Mb size. Dumped process is 60 Kb. This 60 kbyte ( I'm not finished with all the packer layers ) appears to be only some Loader/Unpacker for the real software which is encrypted in the 1 Mb exe file ( after the process image ).
Guessing OEP for each layer is quite hard for me.. are there any other "generic" ways to recognize an OEP ?
( the only one I know of, and which appears on this board too is:
POPAD
RET )
Well, and building up IT... I don't really know when I'm correct.. for some reason the target quits itselfe without any error - even with a complete messed IT.. ( perhaps I've missed some CRC/size check )
Now - does anyone of the grand-crackers have an idea which protection this could be ? Reminds me somehow of "Himan 2" (securom v2. + "special tricks"

I have spent nearly an hour ( maybe too less )into looking for tutorials which explains how to crack multiple protected targets. Does anyone know of some resources I should look into, before I start asking questions here ?
I have to admit.. I prefere to find it out by myself.. but this finding out has cost me nearly 2 weeks by now - and I really don't know if I'm on the right track ( unwrapping layer by layer ).