Munsterboo
02-13-2009, 07:32 AM
Hi everyone, i'm actually new to reverse engineering and I have a target:
[Crack Search Result]
Everywhere I know.
[Program Name]
The DarkZtar Authorization DLL
Version: 1.3
[Target URL]
http://rapidshare.com/files/158505389/DZAuth.dll
[Website]
http://darkztar.com/forum/downloads.php?do=file&id=215
[Protection]
EXE Cryptor v2.4.1
[File Size]
292 KB
[Limitation]
This file prevents unauthorized users from using software created by many different people.
This file does a web authorization.
[Registration method]
web authorization - vBulletin Forum based - Based on user level.
Has a crc check.
[Description]
The .dll is the authorization for many programs at their website.
[0S Platform]
WinXP - Vista 32/64bit
Has I can see I have to: Change PE characteristics (DLL->EXE) and use RSI's unpacker for EXECryptor. Adjust .reloc directory and find OEP (fix it) manually.
Thanks to everyone who can give it a look/crack it/help me.
[Crack Search Result]
Everywhere I know.
[Program Name]
The DarkZtar Authorization DLL
Version: 1.3
[Target URL]
http://rapidshare.com/files/158505389/DZAuth.dll
[Website]
http://darkztar.com/forum/downloads.php?do=file&id=215
[Protection]
EXE Cryptor v2.4.1
[File Size]
292 KB
[Limitation]
This file prevents unauthorized users from using software created by many different people.
This file does a web authorization.
[Registration method]
web authorization - vBulletin Forum based - Based on user level.
Has a crc check.
[Description]
The .dll is the authorization for many programs at their website.
[0S Platform]
WinXP - Vista 32/64bit
Has I can see I have to: Change PE characteristics (DLL->EXE) and use RSI's unpacker for EXECryptor. Adjust .reloc directory and find OEP (fix it) manually.
Thanks to everyone who can give it a look/crack it/help me.