Reverse Engineering RET Homepage RET Members Reverse Engineering Projects Reverse Engineering Papers Reversing Challenges Reverser Tools RET Re-Search Engine Reverse Engineering Forum Reverse Engineering Links

Go Back   Reverse Engineering Team Board > Reverse Engineering Board > File Unpacking
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Reply
 
Thread Tools Display Modes
  #1  
Old 11-18-2019, 01:12 PM
CodeRipper CodeRipper is offline
Member
 
Join Date: Mar 2009
Location: Romania
Posts: 26
Default Enigma Registration Bypass (short tut)

Enigma Registration Bypass (short tut):
Set breakpoint on VirtualAlloc Api, break twice to VirtualAlloc,
search for bytes:
55 8B EC 33 C9 51 51 51 51 51 51 53 8B D8 33 C0

Scroll down until you see:
TEST eax,eax
SETNE AL

EAX should be 01 at TEST eax,eax

"push eax, call ..., TEST eax,eax" "SETNE AL" Bytes:
50 E8 ?? ?? ?? ?? 85 C0 0F 95 C0
Reply With Quote
Reply


Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump





Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2023, Jelsoft Enterprises Ltd.