WHY PATCHING WHILE SERIAL NUMBER IS FISHY

Stealth File Encryptor v3.3
A Cracking Tutorial 
by ASTAGA [D4C/C4A]


DISCLAIMER 

This reading material is not intended to violate Copyrights 
and/or it is law, but educational purposes only. I hold no 
responsibility ( by all means and in any shape whatsoever ) 
of the mis-used of this material.


ABOUT THE PROGRAM 

Stealth File Encryptor is a general-purpose security program that 
encrypts, wipes, and backs up files. A familiar interface makes 
file encryption/decryption a snap. You can encrypt multiple files 
or an entire folder in a single operation with variable security 
levels. You can also encrypt the Clipboard contents for pasting 
as email content. An available Stealth mode can even hide the 
original file names. File wipes are swift and secure, featuring 
multiple data overwrites. 
Stealth File Encryptor can also perform backups featuring user-
defined backup sets. The backed-up files can be optionally 
encrypted, but neither compression nor automatic scheduling is 
offered. Easy to use and well documented, Stealth File Encryptor 
gets high marks.

WHERE TO DOWNLOAD

Author   	: Tropical Software
Homepage 	: http://tropsoft.com/stealth
URL		: http://tropsoft.com/stlth32.exe
Size 		: 478.14  KB  as of July 02,2000


HOW TO GET VALID SERIAL NUMBER by using SoftIce


1.  Run STEALTH.EXE, type STEALTH as your password on the screen,
     in the main program click REGISTER menu.
     In the registration dialog box type these below informations :

	Registered User : Pirates Order 
	Registration Key: 7388105099

    Do not click OK button yet
    

2.  Fire up SoftIce by pressing [ CTRL + D ], put a new breakpoint 
    in this regard is GetWindowTextA : 

	BPX GetWindowTextA     [enter]   and
   	F5  to return to the main program


3.  Click OK button now, you'll return back into SoftIce.
    Press F11, F5, and F11 once again to get into the main program
    codes as follows : 
    ___________________________________________________________________

	0042204A: FF15E0144400	call      GetWindowTextA  <== you're
	00422050: 8B4C2408   	mov       ecx,[esp][0000      here
	00422054: 6AFF        	push      0FF
	00422056: E8723D0000   	call      000425DCD  
	0042205B: EB0C       	jmps      000422069 
	...
	...
	Press F10 3 times and follow jump instruction at 015F:0042205B
	until you see : 

	00422069: 5E           	pop       esi
	0042206A: C20400         	retn      00004 ;" "
	...
	...
	Press F10 2 times, just pass RETURN ( retn ) call until you
	landed here : 

	0040A42F: 8D4DF0        	lea       ecx,[ebp][-0010] <== here
	0040A432: E8E73E0100     	call      00041E31E    
	0040A437: 8D4DF0         	lea       ecx,[ebp][-0010] <== d eax
	0040A43A: E8933E0100     	call      00041E2D2    
	0040A43F: 8D4DEC         	lea       ecx,[ebp][-0014]
	0040A442: E8D73E0100  	call      00041E31E    
	0040A447: 8D4DEC        	lea       ecx,[ebp][-0014]
	0040A44A: E8833E0100 	call      00041E2D2    
	0040A44F: 8B45EC     	mov       eax,[ebp][-0014]
	0040A452: 3958F8   		cmp       [eax][-0008],ebx
	0040A455: 7510         	jne       00040A467    
	...
	...
	Press F10 2 times and dump/display EAX register by typing : 

		d eax  [enter]	you'll see your fake s/n in the
					Data Window.

	Let's trace again, press F10 and follow jump instruction at 
	015F:0040A455  until you see : 

	0040A467: 8B4DF0     	mov  	ecx,[ebp][-0010] <== HERE
	0040A46A: 3959F8       	cmp  	[ecx][-0008],ebx
	0040A46D: 7509      		jne	00040A478  
	0040A476: EBE6           	jmps 	00040A45E
	0040A478: 50            	push 	eax
	0040A479: 51            	push 	ecx
	0040A47A: E8580F0000 	call  	00040B3D7
	0040A47F: 59           	pop  	ecx  <===== D EDX HERE

	Press F10 6 times and stop at 015F:0040A47F , let's dump/
	display the contents in EDX register by typing :

		d edx  [enter]

	Now, look at the Data Window .... what the hell is 4D84378084 
	near your fake serial number ?  It was in the memory address
	of 0167:6AECE1 !!!  

4.  Write down this suspected registration code and disable all break
    points : 

	bd *   [enter]
	F5     to return to registration window


5.  Soon you're return back to the program, the 'beggar-off' msg
    appear on the screen, just click OK to confirm and quit the
    application ( nice try .... Kuczynski !!!! ).

6.  Re-run the program, repeat registration procedure and keyed-in
    4D84378084  as your serial number.
    Successful registration will appear on the screen, you're
    illegaly registered now.

7.  Where the hell is my registration code is stored ??

	-  The correct registration code is encrypted and stored
	   in the file called   Gerhts23.dru  and  Dwphtlts.dru
         which located in your Windows directory ( usually C:\WINDOWS ).


END NOTES

   This program is sold as shareware, so you can try before you buy.  
   This is convenient for you, saves expenses by dispensing with all 
   that packaging, and cuts out the middle person.  So it is cheap, 
   but it is not free.  
   If you like the program, and you will, be sure to register and pay.
   To keep shareware prices low,  users must do the right thing: 
   Register, pay up, and smile/grin at yourself in the mirror.

   Do not distribute your crack release based on this tutorial, because
   you become a LAMER(s)!!!!!!!!
   ( tHATDUDE (PC97) defined LAMER(s) is the guy who sits in front of
   personal computer, using Hex Editor, ripping off other group(s)
   crack release, repacking (distro) them under his name. 
   Adopted from newsgroup alt.cracks, alt.crackers - February 1997 ) 

    More about LAMER(s):
	lamer /n./ [prob. originated in skateboarder slang]
	Synonym for luser, not used much by hackers but common among warez 
	d00dz, crackers, and phreakers. Oppose elite. Has the same connota
	tions of self-conscious elitism that use of luser does among 
	hackers.
    < SOURCE: http://sagan.earthspace.net/jargon/jargon_27.html >


 _ Never attribute to malice that which is adequately explained by stupidity _


ASTAGA [D4C/C4A] tute-stealth33.zip
[EOF] July 31,2000  01:00:08AM