home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Reverse Code Engineering RCE CD +sandman 2000
/
ReverseCodeEngineeringRceCdsandman2000.iso
/
RCE
/
E_bliss
/
phox_crackme1.txt
< prev
next >
Wrap
Text File
|
2000-05-25
|
850b
|
22 lines
PhoX's NAG removal CrackMe
--------------------------
Ok, thisone is sOO easy.. :)
well all you really need to do is to set a breakpoint on MessageBoxA
and start the crackme, then you'll land here:
:0040101E E8DA010000 CALL USER32!MessageBoxA
:00401023 C7050020400003400000MOV DWORD PTR [00402000],00004003
:0040102D C705042040003D114000MOV DWORD PTR [00402004],0040113D
:00401037 C7050820400000000000MOV DWORD PTR [00402008],00000000
:00401041 C7050C20400000000000MOV DWORD PTR [0040200C],00000000
:0040104B A144204000 MOV EAX,[00402044]
:00401050 A310204000 MOV [00402010],EAX
so, all you need to do now is to NOP out the call ;)..
open the file with your favourite hex editor and search for
E8DA010000 and change to
9090909090
And no more nag screen..
---
/Klefz