nergal
January 27th, 2006, 19:09
Hey, just found this forum and it seems great.
I've just started out to learn myself some basic cracking of application. From beeing an application developer I'm now intrested in the opposite, to reverse engineer them
So I got this application I want to remove a time trial nag from (for practice as well for usage), which popups during a button click event. The program is made in VB 6.0 according to the hexadecimal output as it loads the VB6.0 dll file. I've used win32dasm to dissassemble the exe file and also used SoftICE runtime debugger, but I have a hard time to really find the exact jump, as It must be a conditional jump in there somewhere as it prolly is something like this; If valid -> go offset else openTrialDialog. Problem is that I'm not to found with Intel ASM.
I've tested to put NOP (90 hexa) directly into the exe file at a place where I thought the dialog appeared (at the button click), which made the program return an error (200) and stopped the execution.
Questions:
1. Is there any way to patch the exe file directly?
2. If so, can it be done with NOP's or do I have to know the branch location for the non-trial continue.
3. The offset or exact address could be seen if I find the exact conditional jump, right?
4. IF I find the exact location in the dissassembled code, is the address of this jump at the same address as the hexadecimal output gives?
Tools I've used:
*DriverStudio (SoftICE for realtime debugging)
*win32dasm (to dissassemble and realtime debugging)
*ultraedit (for hexa and patching)
I've spend about 20hours myself on this project and as it is the first time I try to crack an application I need some help on the way.
Best Regards,
Nergal
ps. Sorry for the bad english, I'm too tired to write correct or even see my spelling misstakes .ds
I've just started out to learn myself some basic cracking of application. From beeing an application developer I'm now intrested in the opposite, to reverse engineer them

So I got this application I want to remove a time trial nag from (for practice as well for usage), which popups during a button click event. The program is made in VB 6.0 according to the hexadecimal output as it loads the VB6.0 dll file. I've used win32dasm to dissassemble the exe file and also used SoftICE runtime debugger, but I have a hard time to really find the exact jump, as It must be a conditional jump in there somewhere as it prolly is something like this; If valid -> go offset else openTrialDialog. Problem is that I'm not to found with Intel ASM.
I've tested to put NOP (90 hexa) directly into the exe file at a place where I thought the dialog appeared (at the button click), which made the program return an error (200) and stopped the execution.
Questions:
1. Is there any way to patch the exe file directly?
2. If so, can it be done with NOP's or do I have to know the branch location for the non-trial continue.
3. The offset or exact address could be seen if I find the exact conditional jump, right?
4. IF I find the exact location in the dissassembled code, is the address of this jump at the same address as the hexadecimal output gives?
Tools I've used:
*DriverStudio (SoftICE for realtime debugging)
*win32dasm (to dissassemble and realtime debugging)
*ultraedit (for hexa and patching)
I've spend about 20hours myself on this project and as it is the first time I try to crack an application I need some help on the way.
Best Regards,
Nergal
ps. Sorry for the bad english, I'm too tired to write correct or even see my spelling misstakes .ds