iniquity's inequality protection scheme
(and some tips about pascal reverse engineering)


by Flipper

(31 August 1997)

Courtesy of reverser's page of reverse engineering

Well, a quite interesting essay for a couple of reasons:
- Flipper doesn't use neither winice nor wdasm, he cracks with HIEW (and take notice: it is always a good idea to learn how to reverse engineer our targets with a whole collection of tools... heavy paranoid protection schemes specifically targeted against our beloved winice and wdasm are nowadays proliferating like mushrooms... and yet they can be easily cracked with symdeb! :-)
- Flipper is reversing a Pascal target and knows Pascal enough to give us all some very interesting "insights" about pascal compilation... hey Flipper, what about being among the first Authors in our new future +HCU's project: "Compiler peculiarities"? (Starting October 1997).
Well, read and enjoy.

A small notice about pascal

First developed by Niklaus Wirth in the early 1970s, Pascal was intended primarily as a tool for teaching students the fundamentals of good programming practice. However, the clarity and simplicity of the language rapidly attracted interest beyond the world of academia, and Pascal has become a major programming language... almost in spite of itself.
As most of the recent compilers add a great many features to Wirth's original specification, modern Pascal compilers can be just as powerful as the C programming language. In actual fact, programming in Pascal (yet not in Delphi) has some clear benefits over programming in C. For one thing, the syntax of Pascal is less cryptic than C, and, more importantly, Pascal also does a great deal of checking so that the programmer is alerted to errors which a C compiler would let slip through. (Yet I only use C and never really used Pascal... go figure :-)

You'll find easily on the web: - Turbo Pascal (Borland); - QuickPascal (Microsoft); - Prospero Pascal; - Mystic Pascal; - Borland Delphy 1.0 (complete version on PC-Plus superCD 35b, May 1997, 4 UK pounds)

And now enjoy this essay by Flipper!

-- iniquity's inequality protection scheme --
(and some tips about pascal reverse engineering)
by Flipper (upg), 31 Aug 1997
When someone approached me a few weeks ago with the news that a new version of Iniquity BBS had been released, I didn't think much of it. However, in this short text I'll describe how to simply reverse engineer this simple protection scheme. The protection itself is so simple, anyone without any knowledge of assembly could figure out how to bypass it; I hope that this file can be of some use on Reverser's page of "bad protections", so that more so called shareware authors can actually write something worth cracking. Here's a list of what you'll need: 1. a copy of Iniquity 1.01 for DOS [] 2. hiew 5.65 (everywhere on the Web) Let's get started.. allright, install Iniquity, and run it. Nothing new, just a different look in the configuration screen. So, what's to crack here? When I started Iniquity up, it has "Registration Number: 0" (or something close to those words) printed inside the status window. I've looked all over, but I can't see any option to enter a serial number. Okay, so let's read what the README!.1ST has in it. (scroll down a bit, and you'll come to this..) NOTE: Begining with this version of Iniquity, it is now "freeware/shareware". Everyone gets a freeware two node license. If you want to run more than two nodes - you must register. The price structure is as follows: 4 nodes - $50 16 nodes - $100 48 nodes - $150 124 nodes - $200 I did this because it has costed me thousands of dollars in compilers to write the telnet server stack - and it will cost more to implement the web server. I just have to say one thing before we continue to reverse engineer this program; Iniquity was written in Turbo Pascal 7.0. That means that it most likely was compiled with Borland's standard issue compiler for pascal, which you can get for free everywhere and is anyway sold for less than 100 dollars. A good TCP/IP library (TPU unit) can be found by browsing through the vast SWAG archives, and wouldn't cost a cent.. however, this person thinks that people will pay for a bbs which is a 'telnet server'. You be the judge :-) So, that's the protection right there. If you try and run a bbs with more than two nodes, it will simply not work. So, if you run Iniquity like so: *NOTE*, make sure to have the multinode option set to 'yes' before you try run Iniquity multinode. C:\BBS\iniquity node 3 Here's the message that comes up below. --begin snippet detecting computer hardware [node 3] Iniquity is only registered for 2 nodes, for more nodes please write to support at --end snippet Here's the plan. Load up INIQUITY.EXE in hiew 5.65. Press F7, and type in the search string "for more nodes". You'll end up at $614C, and there's the text string in plain sight. Scroll down a bit to $6362, and you'll see the bytes '55 89', which in pascal's case, happens to the be the code for the beginning of a procedure. Press F4, and then F3, and you'll be able to view the ASM source of the procedure. Usually, with pascal in general you can find the code which uses a string directly below it, starting with the characters 'U‰' and ending with a RETF, or a LEAVE statement. You'll see something like this.. 00006362: 55 push bp 00006363: 89E5 mov bp,sp 00006365: B80002 mov ax,00200 00006368: 9A3005421E call 01E42:00530 0000636D: 81EC0002 sub sp,00200 00006371: 9A0303421E call 01E42:00303 00006376: A3B8C6 mov [0C6B8],ax There's nothing interesting going on here, so we'll just browse through this sort of 'dead listing' and see if we have any luck :> Now, knowing that this program was written in pascal, we can usually assume the programmer has done one of two things. (1) the worst way to check something... like this ;-) NumberOfNodes := 2; if ParamStr(3) <= NumberOfNodes then begin .. run the bbs .. end else begin writeln ('please buy more nodes!'); halt(1); end; (2) a nicer, much neater way.. NumberOfNodes := 2; if ParamStr(3) > NumberOfNodes then begin writeln ('please buy more nodes!'); halt(1); end; So, keep this in mind while 'guessing and testing' through the code. Sooner or later, you'll come across a row of instructions that looks like this: 000068DE: 9A1F05291C call 01C29:0051F - 000068E3: 9AB70F421E call 01E42:00FB7 - 000068E8: BF9019 mov di,01990 000068EB: 0E push cs 000068EC: 57 push di 000068ED: 9AB70F421E call 01E42:00FB7 - 000068F2: 6A00 push 000 000068F4: 9A6409421E call 01E42:00964 - 000068F9: 9A6108421E call 01E42:00861 - 000068FE: 9AF404421E call 01E42:004F4 - **00006903: 803E68BC02 **cmp b,[0BC68],002 **00006908: 7670 **jbe 00000697A - 0000690A: BF14DA mov di,0DA14 0000690D: 1E push ds 0000690E: 57 push di 0000690F: 9A4008421E call 01E42:00840 - 00006914: 9AF404421E call 01E42:004F4 - 00006919: BF14DA mov di,0DA14 0000691C: 1E push ds 0000691D: 57 push di 0000691E: 9A4008421E call 01E42:00840 - 00006923: 9AF404421E call 01E42:004F4 - 00006928: BF14DA mov di,0DA14 The code that we're concerned about is at offset $6903. >00006903: 803E68BC02 cmp b,[0BC68],002 >00006908: 7670 jbe 00000697A - First, compare the node number entered on the command line (the ParamStr function was called before these instructions). (J)ump if it's (B)elow or (E)qual to the maximum number of nodes. So, you could simply modify the value on line $6903, but there's an easier way to let yourself use as many as 255 nodes maximum. Simply change this instruction 00006908: 7670 jbe 00000697A to 00006908: EB70 jmps 00000697A forcing the program to jump to the loading sequence unconditionally. That's all there is to it. I read a usenet post that stated "I'd like to see anyone get past Iniquity's new 128-bit encryption! heh." I don't know about you, but I sure didn't see any encryption while I was poking about the asm code ;) a small note to all shareware programmers, stay away from protections like this one, it certainly won't make you much money, that's for sure. written by flipper (upg) on 08/30/97. (c) flipper 1997. All rights reversed
You are deep inside reverser's page of reverse engineering, choose your way out:

red Back to Project 7
redhomepage redlinks redanonymity +ORC redstudents' essays redacademy database
redtools redcocktails redantismut CGI-scripts redsearch_forms redmail_fravia
redIs reverse engineering legal?