SERIAL NUMBER IS FISHY - DECLINE YOUR PATCH'ITCH'ING RasMan v1.46 A Cracking Tutorial by ASTAGA [D4C/C4A] DISCLAIMER This reading material is not intended to violate Copyrights and/or it is law, but educational purposes only. I hold no responsibility ( by all means and in any shape whatsoever ) of the mis-used of this material. Read END NOTES section at the end of this file. ABOUT THE PROGRAM Welcome to RasMan, A shareware application to monitor all of your Dial-Up Networking connections. There are numerous online timers already out on the Internet, so you may say why another one. I have evaluated numerous online timers but none of them provi ded exactly what I wanted. Some of the problems were: For such a simple requirement some of the program were overly complicated or had special requirements. None of the programs out there were able to accurately take into account the many different costing rules being used by ISPs and telecom providers. The types of reporting available in some programs were limited or non-existent. What I wanted was a nice flexible program, small in size, unob trusive and easy to use. So with that in mind here is a list of RasMan features: o The size of RasMan.exe itself is just 100k and the code inside it has been designed in such a way to affect system performance as little as possible. o The program leaves all of the reporting and costing issues to an external program. This leaves RasMan to the job of monitoring connections and leaves all the complications of costing / reporting to more capable programs. o Instead of providing reporting, RasMan generates a log file which can be easily imported into programs such as Microsoft Excel. The format itself is totally customizable. The program also generates a "schema.ini" file which allows the CSV file to be used as an DAO data source. o The program is simple to use. Just run it and forget about it, until you want to review your Internet usage. WHERE TO DOWNLOAD Author : PJ Naughter Copyright : PJ Naughter Homepage : http://www.naughter.com URL : http://www.naughter.com/download/rasman.zip Size : 49 KB as of January 01, 2001 Rel Date : 8 May 2000 HOW TO GET VALID SERIAL NUMBER by using SoftIce This time I will feed you like a baby, because too many question how to find the location where S/N can be fish(ed). Here, I will bring you how did I work. So, you can feel what is right and wrong ( and pain of pressing F10 key ) during debugging this program until you found reliable location where S/N is calcu lated and/or generated. There is no concealment matters here, assume both of us walking in the dark 1. Run RASMAN.EXE, in the registration dialog box type these below informations : Name : Pirates Order Code : 73881050 Do not click OK button yet 2. Load SoftIce by pressing [ CTRL + D ], set a breakpoint as follow : BPX GetWindowTextA [enter] and F5 to return to the main program 3. Now, click OK button... you'll return back into SoftIce! In within SoftIce press F11, F5, F11, then F12 11 times until you see and break at : ______________________________________________________________ 015F:6C386373 FF1594B5406C CALL [USER32!GetWindowTextA] 015F:6C386379 8D4518 LEA EAX,[EBP+18] 015F:6C38637C 50 PUSH EAX 015F:6C38637D 8D45E0 LEA EAX,[EBP-20] 015F:6C386380 FF7510 PUSH DWORD PTR [EBP+10] 015F:6C386383 50 PUSH EAX 015F:6C386384 E803010000 CALL 6C38648C 015F:6C386389 85C0 TEST EAX,EAX 015F:6C38638B 0F84090B0500 JZ 6C3D6E9A .... .... _________________________ MFC42!.text+00015373 _______________ Wait, wait a minute... you break on MFC instead of RASMAN's main program's code. That's not good even you can get fake code and user name by pressing F10 2-4 times respectively. Press F12 4 times to reach RASMAN main program's code. 4. If nothing goes wrong, you'll break and see these below snippet codes : _______________________________________________________________ 015F:0040CD25 E8F0080000 CALL 0040D61A <== here 015F:0040CD2A 85C0 TEST EAX,EAX 015F:0040CD2C 7478 JZ 0040CDA6 015F:0040CD2E 8B4660 MOV EAX,[ESI+60] 015F:0040CD31 50 PUSH EAX 015F:0040CD32 683C524100 PUSH 0041523C 015F:0040CD37 68E8504100 PUSH 004150E8 015F:0040CD3C E8CF47FFFF CALL 00401510 015F:0040CD41 8BC8 MOV ECX,EAX 015F:0040CD43 81C1F4000000 ADD ECX,000000F4 015F:0040CD49 E822B8FFFF CALL 00408570 015F:0040CD4E 8B4E64 MOV ECX,[ESI+64] 015F:0040CD51 51 PUSH ECX 015F:0040CD52 6830524100 PUSH 00415230 015F:0040CD57 68E8504100 PUSH 004150E8 015F:0040CD5C E8AF47FFFF CALL 00401510 015F:0040CD61 8BC8 MOV ECX,EAX 015F:0040CD63 81C1F4000000 ADD ECX,000000F4 015F:0040CD69 E8B2B7FFFF CALL 00408520 015F:0040CD6E E89D47FFFF CALL 00401510 015F:0040CD73 8BC8 MOV ECX,EAX 015F:0040CD75 E8B66EFFFF CALL 00403C30 ==> F8 015F:0040CD7A 85C0 TEST EAX,EAX 015F:0040CD7C 6AFF PUSH FF ... _________________________ RASMAN!.text+BD6E ___________________ Press F10 4 times - stop at 015F:0040CD31 - dump/display EAX register : : d eax [enter] ==> user name at virtual 0167:0066076C Press F10 7 times - stop at 015F:0040CD4E - look at Register Window ... see that DS:0064F51C=046755DA ? let's check it out what is inside : : ? 046755DA [enter] 046755DA 0073881050 " gU " ==> your fake code at virtual 0167:xxxxxxxxxxxx Press F10 again and stop at 015F:0040CD75 - follow this CALL function by pressing F8 key. Note : you can ignore my guidance by pressing F10 at 015F: 0040CD75 and at last you'll get beggar-off message. However, you should try this until you feel and understand why 5. By following the above CALL, you'll see these below snippet codes : 015F:00403C30 6AFF PUSH FF 015F:00403C32 6880E04000 PUSH 0040E080 015F:00403C37 64A100000000 MOV EAX,FS:[00000000] 015F:00403C3D 50 PUSH EAX 015F:00403C3E 64892500000000 MOV FS:[00000000],ESP 015F:00403C45 83EC14 SUB ESP,14 015F:00403C48 56 PUSH ESI 015F:00403C49 68605B4100 PUSH 00415B60 015F:00403C4E 8DB1F4000000 LEA ESI,[ECX+000000F4] 015F:00403C54 683C524100 PUSH 0041523C 015F:00403C59 8D44240C LEA EAX,[ESP+0C] 015F:00403C5D 68E8504100 PUSH 004150E8 015F:00403C62 50 PUSH EAX 015F:00403C63 8BCE MOV ECX,ESI 015F:00403C65 E8A6470000 CALL 00408410 015F:00403C6A 6834524100 PUSH 00415234 015F:00403C6F 8D4C2408 LEA ECX,[ESP+08] 015F:00403C73 C744242400000000 MOV DWORD PTR [ESP+24],00000000 015F:00403C7B E8EC950000 CALL 0040D26C 015F:00403C80 6A00 PUSH 00 ... to cont'd _________________________ RASMAN!.text+2C30 ___________________ 6. Finally after long tracing you'll reach these below snippet codes : _______________________________________________________________ cont'd.... 015F:00403C80 6A00 PUSH 00 015F:00403C82 6830524100 PUSH 00415230 015F:00403C87 68E8504100 PUSH 004150E8 015F:00403C8C 8BCE MOV ECX,ESI 015F:00403C8E E81D470000 CALL 004083B0 015F:00403C93 8D4C2408 LEA ECX,[ESP+08] 015F:00403C97 8BF0 MOV ESI,EAX 015F:00403C99 E832360000 CALL 004072D0 015F:00403C9E 8B4C2404 MOV ECX,[ESP+04] 015F:00403CA2 C644242001 MOV BYTE PTR [ESP+20],01 015F:00403CA7 8B41F8 MOV EAX,[ECX-08] 015F:00403CAA 8D4C2404 LEA ECX,[ESP+04] 015F:00403CAE 50 PUSH EAX 015F:00403CAF 50 PUSH EAX 015F:00403CB0 E8B1950000 CALL 0040D266 015F:00403CB5 50 PUSH EAX 015F:00403CB6 8D4C2410 LEA ECX,[ESP+10] 015F:00403CBA E881360000 CALL 00407340 **** 015F:00403CBF 33D2 XOR EDX,EDX 015F:00403CC1 3BF0 CMP ESI,EAX ==> ? EAX;? ESI 015F:00403CC3 0F94C2 SETZ DL ... _________________________ RASMAN!.text+2CBA ___________________ Press F10 once - stop at 015F:00403CC1 - check that EAX and ESI registers : :? esi 046755DA 0073881050 " gU " ==> your fake code :? eax 3DE3A6D0 1038329552 "= " ==> your potential red code. Write it down. NOTE : I HOPE THIS TUTE CAN ANSWER THE MOST 'FAQ' : " HI ASTAGA ... HOW DID YOU FIND, LOCATE MEMORY ADDRESS THAT S/N CAN BE CAUGHT ?? " ; " WHAT / WHY I SHOULD DO A SEARCH STRING ..." ; I remind you that tracing codes ( debugging ) IS NOT A NICE JOB. As a matter of fact, i tooks TIME and PATIENCE. If you read tute and feel how easy to fish a S/N, it is becau se I (we) have traced the codes for you. That's why I always include the memory location and hex code(s) in all my tutes. If you little bit trained you can do a search string for the CALL function near the classic CMP/JN/JNZ instructions i.e you can BPX at 015F:00403CBA , BUT by doing this little trick you just can get valid serial number NOT how and where did you or should reach and found that suspicious location. By reading tutes and practising it, you will have build, develope your own feeling, AND intuition ( or maybe Zen ) over target program. Moreover, don't hesitate to dump, check every changes occured in the Register Window. 7. Disable all breakpoints by typing BD * [enter] Press F5 or X to return to the main program 8. Repeat registration procedure and keyed-in 1038329552 as your S/N. Click OK button ..... there you're registered. 9. Where the hell is my registration code is stored ?? The correct registration code is stored in the registry as follows : REGEDIT4 [HKEY_LOCAL_MACHINE\Software\PJ Naughter\RasMan\General] "Name"="Pirates order" "ID"=dword:3de3a6d0 10. How can I practise with my own user name ? - I strongly recommended you not to do this ! E N D N O T E S Distributing your serial number is illegal and is no different than distributing illegal copies of the registered software. Violation of this rule may result in temporary or permanent revocation of this license and cancellation of the serial number; the original licensee will also be held responsible for damages, physical and estimated. Do not distribute your crack release based on this tutorial, because you become a LAMER(s)!!!!!!!! ( tHATDUDE (PC97) defined LAMER(s) is the guy who sits in front of personal computer, using Hex Editor, ripping off other group(s) crack release, repacking (distro) them under his name. Adopted from newsgroup alt.cracks, alt.crackers - February 1997 ) More about LAMER(s): lamer /n./ [prob. originated in skateboarder slang] Synonym for luser, not used much by hackers but common among warez d00dz, crackers, and phreakers. Oppose elite. Has the same connota tions of self-conscious elitism that use of luser does among hackers. < SOURCE: http://sagan.earthspace.net/jargon/jargon_27.html > Never attribute to malice that which is adequately explained by stupidity ASTAGA [D4C/C4A] tute-rasman146.zip [EOF] 1/2/01 4:33:58 PM