Reverse Engineering RET Homepage RET Members Reverse Engineering Projects Reverse Engineering Papers Reversing Challenges Reverser Tools RET Re-Search Engine Reverse Engineering Forum Reverse Engineering Links

Go Back   Reverse Engineering Team Board > Reverse Engineering Board > Reverse Code Engineering
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Reply
 
Thread Tools Display Modes
  #1  
Old 01-29-2011, 05:24 AM
lttleastig lttleastig is offline
Member
 
Join Date: Jan 2011
Posts: 5
Default Help Reversing HWID

I need to bypass HWID checking any clues on how to do that
link to tuts? all i know is that it does not atempt to conect to the internet while checking for HWID so i guess the HWID must be hardcoded into the app if thats of any help

thanks in advance

Last edited by lttleastig : 06-10-2019 at 11:34 AM.
Reply With Quote
  #2  
Old 01-29-2011, 11:24 PM
lttleastig lttleastig is offline
Member
 
Join Date: Jan 2011
Posts: 5
Default

In adddition to that PEID said its
Microsoft Visual C# / Basic .NET
do i still have to unpack it or anything?
or can i use olly straight away?
Reply With Quote
  #3  
Old 01-30-2011, 02:18 PM
ac!d ac!d is offline
Member
 
Join Date: Sep 2010
Posts: 25
Default

Quote:
do i still have to unpack it or anything?
PEiD does not recognize .net protectors, scan the files with Protection ID and post the log.

Quote:
or can i use olly straight away?
olly is for win32 pe file debugging and does not really fit for '.net patching'.
Reply With Quote
  #4  
Old 02-03-2011, 05:20 AM
lttleastig lttleastig is offline
Member
 
Join Date: Jan 2011
Posts: 5
Default

Did it comes up with this

Quote:
-=[ ProtectionID v0.6.4.0 JULY]=-
(c) 2003-2010 CDKiLLER & TippeX
Build 07/08/10-17:57:05
Ready...
Scanning -> C:\Users\Philip\Documents\Tencent Files\1828860543\FileRecv\GM.exe
File Type : 32-Bit Exe (Subsystem : Win GUI / 2), Size : 1563648 (017DC00h) Byte(s)
[File Heuristics] -> Flag : 00000000000001001101000000110000 (0x0004D030)
[CompilerDetect] -> .NET
[!] File appears to have no protection or is using an unknown protection
- Scan Took : 0.797 Second(s)
guys any advice on how to "crack" this?

Last edited by Git : 02-03-2011 at 07:47 AM.
Reply With Quote
  #5  
Old 02-03-2011, 11:33 AM
ac!d ac!d is offline
Member
 
Join Date: Sep 2010
Posts: 25
Default

google some .net debuggers (dile, reflector..) and read some docs.
if your target is not packed or obfuscated it should not be that hard to crack it.

also google .net reversing as i think you don't really have a clue what you are doing
Reply With Quote
  #6  
Old 02-04-2011, 05:55 AM
lttleastig lttleastig is offline
Member
 
Join Date: Jan 2011
Posts: 5
Default

yeah i really dont know anything any tuts that you could sugest?

thanks for the reply btw
Reply With Quote
  #7  
Old 02-05-2011, 09:02 PM
lttleastig lttleastig is offline
Member
 
Join Date: Jan 2011
Posts: 5
Default

well downloaded reflector how do i edit anything?
i also want to change the chinese text to english btw
but even that i couldn't find how
here's a copy of the app withh all files
http://www.mediafire.com/?i4tkuqczbvhr8t5
Reply With Quote
Reply


Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump





Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2022, Jelsoft Enterprises Ltd.