Jump to content

Patch new .exe according to an old cracked .exe


Ehsan

Recommended Posts

Hi

I've got a question:

Is there any chance that we could patch a .exe file, according to an old cracked .exe of the same software?

suppose that only addresses of binaries have changed (I'm not programmer) and protection of software has not changed

If yes,

How can I do/crack the new original .exe file?

Any tutorial/video/pdf to show a demo ?

or even anybody can do it?

(Consider we have [old.exe] + [old_cracked.exe] + [new_not_cracked.exe] )

Link to comment
Share on other sites


  • Replies 4
  • Views 1.3k
  • Created
  • Last Reply

I don't know if this is the correct location for the topic given the subject. It all depends on how much the code has changed or has been refined. Either way, you should give credit to the original author of the crack so not to be labeled a ripper. There are lots of variables that cause patches or cracks to stop working. Also would depend on if the exe is packed and type of encryption used if any. Not exactly a easy question to answer, sorry.

Its better to step through the code so you get familiar with how the code flows. Gives you better understanding the more you do it.

Link to comment
Share on other sites


Hi

thanks for reply

If it's not the right place please someone relocate the post, if that's ok.....

The problem is I dont know who has fixed the file!!

there was no .nfo with it!

Can you help me to fix that ??

If yes, I post @ Request section with full details

Scanning -> C:\Program Files\DesignII\DESWIN.exe
File Type : 32-Bit Exe (Subsystem : Win GUI / 2), Size : 9850880 (0965000h) Byte(s)
Compilation TimeStamp : 0x50E4E803 -> Thu 03rd Jan 2013 02:08:03 (GMT)
[File Heuristics] -> Flag #1 : 00000100000000001000000000000000 (0x04008000)
[Entrypoint Section Entropy] : 6.11 (section #0) ".text " | Size : 0x74848C (7636108) byte(s)
[DllCharacteristics] -> Flag : (0x0000) -> NONE
[sectionCount] 4 (0x4) | ImageSize 0xB14000 (11616256) byte(s)
[Debug Info] (record 1 of 1) (file offset 0x74E8E0)
Characteristics : 0x0 | TimeDateStamp : 0x50E4E803 | MajorVer : 0 / MinorVer : 0 -> (0.0)
Type : 2 (0x2) -> CodeView | Size : 0x39 (57)
AddressOfRawData : 0x84490C | PointerToRawData : 0x84490C
CvSig : 0x53445352 | SigGuid 437A452A-8D55-4A57-B25821BDFF6AE08C
Age : 0x1 | Pdb : c:\dii\deswin\Release\DESWIN.pdb
[!] DONGLE - Rainbow SENTiNEL SUPER PRO references detected !
[CdKeySerial] found "Test Version" @ VA: 0x007FACBA / Offset: 0x007FACBA
[CdKeySerial] found "Invalid code" @ VA: 0x008BB638 / Offset: 0x008BB638
[CdKeySerial] found "Invalid code" @ VA: 0x008BB68C / Offset: 0x008BB68C
[CdKeySerial] found "Invalid code" @ VA: 0x008BB884 / Offset: 0x008BB884
[CdKeySerial] found "Invalid code" @ VA: 0x008BB8D8 / Offset: 0x008BB8D8
[CompilerDetect] -> Visual C++ 8.0 (Visual Studio 2005)

Link to comment
Share on other sites


I will be honest with you and please don't get mad but most reverse engineers don't do request. So if no one really responds don't get upset. Some like myself have limited time now but I did get most updated over the holidays. Most don't realize how much time it can take reversing and some apps are harder then others. I would help but time is not on my side for the next few months.

Link to comment
Share on other sites


Hi

I've got a question:

Is there any chance that we could patch a .exe file, according to an old cracked .exe of the same software?

suppose that only addresses of binaries have changed (I'm not programmer) and protection of software has not changed

If yes,

How can I do/crack the new original .exe file?

Any tutorial/video/pdf to show a demo ?

or even anybody can do it?

(Consider we have [old.exe] + [old_cracked.exe] + [new_not_cracked.exe] )

https://www.raymond.cc/blog/how-to-crack-programs-yourself-with-offset-comparison-tool/

The tool itself :- http://www.mediafire.com/download/3p1k639nbntane4/dup2.rar

I accept no responsibility for any damage you cause to your system / software / cat.

Link to comment
Share on other sites


Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...