Сейчас на форуме: rmn (+1 невидимый пользователь)

 eXeL@B —› WorldWide —› IDA trace or sniff
Посл.ответ Сообщение

Ранг: 1.5 (гость)
Активность: 0=0
Статус: Участник

Создано: 25 июня 2008 23:31
· Личное сообщение · #1

Hello there, and glad to be here for my first post

I've read inside some good crakz pages that IDA is able to read/trace a main app then show you where flexlm is calulating the codes from a facke licence.
I will be very thanksful if someone could help me to understand better how it's possible.
It's just for understanding and because i find this job veryyy interesting.
Thank you so much and sorry if my question is too newbie




Ранг: 387.4 (мудрец)
Активность: 0.170
Статус: Участник
системщик

Создано: 25 июня 2008 23:35
· Личное сообщение · #2

IDA lets you analyze and annotate assembly instructions in the binary. Once you have found the interesting piece (flexlm call in your case) you can debug the app. IDA has a built-in debugger for Windows and will let you put a breakpoint and trace what happens in the code.



Ранг: 1.5 (гость)
Активность: 0=0
Статус: Участник

Создано: 26 июня 2008 00:07
· Личное сообщение · #3

Thank you so much **s0larian** what a nice reply ;)
I think it's exactely how you describe the thing.I've read so many pages about that but still need an high professor to teach me .
So you mean it's possible...wowow, a new hope come to me.
It's written somewhere and also as you said, the debugger let you put a breakpoint and wait for the new code
generated by flexlm itself during the code.
Is it really possible ?
This is what i've found :
Voila! At address .4715EC you can see the best part of all FLEXlm code -- license number from license.dat and generated number comparison. That's all. You can have it directly by typing :D DS:71E1B8 or by passing all JNE 471613 with zero flag and wait while FLEXlm converts this binary to text string at .471609




Ранг: 387.4 (мудрец)
Активность: 0.170
Статус: Участник
системщик

Создано: 26 июня 2008 00:31
· Личное сообщение · #4

cpage, so what are you asking?

The snippet you provided talks about defeating the mechanism using softice, I think. You cannot blindly follow it. Load the binary into IDA, find the "license checkout" call and then take it from there.



Ранг: 1.5 (гость)
Активность: 0=0
Статус: Участник

Создано: 29 июня 2008 00:33 · Поправил: cpage
· Личное сообщение · #5

Yes sorry i'm not clear but it's not clear in my mind too
So, Yes the main prog need to be patched and specialy the checkout.
Where can i find help for this part ?
I have a chance if i'm starting from point '0' ? i mean starting to learn IDA.
I know people from here got a very high knowledge and experiences and i hope not hurt you with
that kinds of questions, but who never start from '0 ?
So you talk about sniffing the license checkout.
I made some good research inside my binary file and found a nice strings like ,checkout vendor, checkout features, checkout flags wait....
Any help are welcome



Ранг: 1.5 (гость)
Активность: 0=0
Статус: Участник

Создано: 19 июля 2008 01:00
· Личное сообщение · #6

no more chance to get help from this great communauty ?
i'm lost...thank you



Ранг: 1.5 (гость)
Активность: 0=0
Статус: Участник

Создано: 27 июля 2008 19:59
· Личное сообщение · #7

PS:
A large donation could be done against precious help.
THX


 eXeL@B —› WorldWide —› IDA trace or sniff
:: Ваш ответ
Жирный  Курсив  Подчеркнутый  Перечеркнутый  {mpf5}  Код  Вставить ссылку 
:s1: :s2: :s3: :s4: :s5: :s6: :s7: :s8: :s9: :s10: :s11: :s12: :s13: :s14: :s15: :s16:


Максимальный размер аттача: 500KB.
Ваш логин: german1505 » Выход » ЛС
   Для печати Для печати