Punisher's Tutorials Page
ASSEMBLY / SOFT-ICE TUTORIALS
GAVIN'S GUIDE TO 80x86 ASSEMBLY
CORNS SOFT-ICE TUTORIAL FOR BEGINNERS
My Tutorials
Tutorials written: 24
This is my first tutorial. I choose this tutorial because as a newbie it is easier to explain so that other newbies can understand. In this tutorial I will teach you how to crack TwinExplorer 1.0 by patching it. |
|
Cracking JavaScript Scrambler V1.11-Using the Memory Echo Method. |
|
Finding a hardcoded serial number in Directory Printer 2.0. Another example of a foolish protection scheme by a lazy programmer. |
|
Turning a weak protection scheme into it's own Key Generator. |
|
Coming up with a Serial number which is half hard-coded and half calculated. Here is a Key Generator for Add/Remove v2.0. I did it in WIN95 Assembly Language. It may have a few bugs. I did not test it thoroughly. |
|
Using BRW - Borland's Resource Work to delete a nag screen thus removing the protection scheme. |
|
Splash is a web authoring tool that uses the TL32v20.DLL as it's protection scheme. |
|
Fishing for a hardcoded serial number the softice way. How stupid and lazy can these shareware protectionists get. |
|
Zen Fishing a serial number that is calculated from your name. |
|
Disassembling and seraching for a hard coded serial number. What a weak protection scheme. |
|
Cracking both Win-eXpose-Registry and Win-eXpose-IO by the same method. Same protection scheme for both of them. |
|
Fishing another hard coded serial number from another very easy and stupid protection scheme. |
|
Cracking ByteCatcher Pro v3.2 and ByteCatcher FTP Client v1.04. These two programs make use of the same protection scheme. Follow instructions for ByteCatcher Pro and you will crack ByteCatcher FTP Client. |
|
A hard-coded serial number. Yet another very stupid protection scheme. |
|
A very interesting but weak protetion scheme. Even if it is weak a newbye can learn much from it. |
|
Finding the compare of the real reg key with the fake reg key. |
|
When I downloaded this program I thought I was going to have a hard time cracking it. Lo and Behold it only 3 minutes. |
|
Finding the compare of our fake regcode with the real regcode. |
|
Locating the cmp of the real regkey with the fake regkey. |
|
Resurrecting a dead program by changing a couple jumps to make an expire program run for life. |
|
Searching for a hard coded serial number without even looking at the code. |
|
Locating the repz cmpsb to get the real regcode. |
|
Using the deadlisting method to get around a protection scheme. |
|
Killing two birds with one stone. Cracking two programs with the same protection scheme. |
|
CDB Tutorials
Tutorial 1 VB cracking
Tutorial 2 Function Disabled Protections
Tutorial 3 Alternative to Serial # Locating
Tutorial 4 General Cracking Questions
Tutorial 5 Modifying DLLs to give real reg codes
+ORC's Tutorials
Tutorials by the master
+ORC is one of the first crackers (Reverse Engineers) that started writing tutorials about cracking in order that others can learn this noble art.
He is considered as the founder of the +HCU: Academy of Reverse Engineering.
His name stands for 'OLD RED CRACKER'. He seems to be an enigma on the web. Know one seems to know who he is and all attemps to stalk him so far, has been unsuccesful. His students at the +HCU carry the plus sign (+) in their names as a sign of respect to this great man.
Download All +ORC's Tutorials in one zip file.
ManKind's Tuts
Open Sesame v 3.1 ManKind
shows you how to fish a serial and decode the protection scheme in
order to make a key generator.
WIndowBLinds v0.97 Another Serial Fishing by ManKind.
|