Norton Utilities v3.0
Introduction |
Greetings and welcome to the noble art of reverse engineering!
Tools required |
Numega Softice v3.22
Target's URL |
http://shop.symantec.com/cgi-bin/trialware/
Essay |
Ok! the first thing we are going to do, is to fool the program that we have been connected to symantec and recived the unlockingcode!
The reason we do that, is to get the hidden "Unlocking-window".
Step1. Run Norton Utilities and click on [Buy Now].
Step2. Then exit Norton and go to: "c:\windows " and open rsagent.
xxxxxx If you trace down in the file you will soon find:
xxxxxx mailstat=0
xxxxxx change the value to: '1'.
Step3. Run Norton again and choose [Buy Now].
Step4. Start Softice by holding down Ctrl and D.
Step5. Type: bpx getdlgitemtexta and press enter!
Step6. Press 'F5' to return to norton, back in norton type in: first name, last name and
xxxxxx this fake code: 1234567890, then press
xxxxxx [OK] and softice will break due to getdlgitemtexta.
Step7. Press 'F11' once!
Step8. Trace through the code with 'F10' intill you see...
xxxxxxxxx :100056A8xx 51xxxxxxxxxxxxxxxxxxxx PUSHxx ECX
xxxxxxxxx :100056A9xx 52xxxxxxxxxxxxxxxxxxxx PUSHxx EDX
xxxxxxxxx :100056AAxx 50xxxxxxxxxxxxxxxxxxxx PUSHxx EAX
xxxxxxxxx :100056ABxx E8D0620000xxxxxxxxxx CALLxx 1000B980
xxxxxxxxx :100056B0xx 83C40Cxxxxxxxxxxxxxxx ADDxxx ESP, 0C
xxxxxxxxx :100056B3xx 8D8C24D8000000xxxxxx LEAxxx ECX,[ESP+000000D8]
xxxxxx Type: d ecx =>The valid unlocking code!
Step9. Well...ok, now for the push!
xxxxxx Go to....
xxxxxxxxx :100056BFxx 51xxxxxx PUSHxxx ECX =>Push valid unlocking code to the stack!
xxxxxx and dump (d ecx) =>Valid unlocking code!
Step10. Type: bc* to delete all breakpoints.
OK! that`s it!
Final Notes |
BACK |