How to crack Portscan v1.2b1
(More about password xoring protection schemes)
by Hackmore Readrite
Courtesy of Reverser's page of reverse engineering
Portscan v1.2b1 Cracked by Hackmore Readrite, DataMiners Inc.
"Keep it FREE!"
From the "Readme" file included with Portscanner...
Port Scanner is a tool that allows you to scan a group of IP addresses
looking for the presence of specific incoming TCP/IP ports. This is a
large benefit to anyone managing a TCP/IP network, or to anyone who is
concerned with the possible security risks that some TCP/IP tools
present to their network.
Using an intuitive interface that allows you to specify the start and
end addresses of a scan, you can quickly check a specific machine, a
subnet, or an entire domain. Port Scanner comes predefined to scan for
the most common TCP/IP services, and provides a quick way to add new
ports to any scan. In addition, Port Scanner lets you scan a subset of
the existing ports, and to save subsets into named groups for easy
recall. Scan results can be easily printed or save to a file.
Port Scanner requires a WinSock compatible TCP/IP stack, and is fully
Windows 95 compatible.
This "shareware" program has a nag screen that wont let you cancel
until it "times out" (about 30 seconds but seems like forever!) To make
things worse, the nag screen hits you when you open the program, and then
again when you close it! And... you are only allowed 5 ports for each
"group" of ports you want to make.
If you want to use this little program, you can get it at:
Here's how I cracked it. Most of this stuff is pretty basic so
I'll just explain whats going on until I get to the good stuff. You'll get
to see all the code anyway when you crack it yourself.
We load the program into SoftIce, and when the nag screen pops up,
we push the register button. Enter a name, and (I found out later) a 25
digit NUMBER. Since I wanted the program registered in my name, thats what
I entered, which was also a mistake. (Hackmore Readrite is 17 characters
so I had to loop through the math subs 34 times! Twice for each character)
O.k. Information is entered into the boxes, so...
ctrl-d ;enter SoftIce
s ds:0 lffffffff "123,454,321" ;search for the number I entered
found at 0030:8028#### ;number was found, and to my
;surprise, my name was just two
;lines below the number in the
bpr ds:8028#### ds:8028#### rw ;break on the number I entered
bpr ds:8028#### ds:8028#### rw ;break on my name
ctrl-d ;enter program, push the button to
;register the program.
Do these last three steps a bunch of times because both the "name"
and the "number" are moved four times each befor we get to use them. Each
time a string got moved, I deleted my old breakpoint on that string and
set up a new breakpoint for the new location.
Then the fun begins. Right away, we get kicked out because the first
cmp instruction checks to see if the serial number is 25 digits. (19 hex)
If the number has more than or equal to 25 digits, we're a good guy. Less
than 25 digits means bye-bye.
So after a new start, with the proper number of digits, we can move
on. Next we do some compares (cmp) to see if there are any "$", " ", "+",
or "-" in the string of digits. It looked to me like the program didn't
like those characters so I didn't push the matter, I just edited memory to
change my coma's to digits.
The digit string checks out so its time to do some math. We start
with the first character of the text string, move it to a new point on the
stack for storage. Then we hop around the string, grab a character, XOR it
to the byte we have stored, save the result at the same (storage) address,
then pick a new character, ADD it to our stored byte, save it to the same
storage address again, pick a new character, XOR it, save it.... you get
the rythem, right? Each pass through this loop, we get a character, each
even numbered pass we XOR our character to "storage", each odd numbered
pass we ADD our character to "storage". The result is saved at "storage"
at the end of each pass.
This goes on until each character has been ADD'ed and XOR'ed to the
resulting byte which is always saved to the same address. (Like I said, 34
passes through the subroutines for "Hackmore Readrite" which ended up to
be "C8" when all the math was through.)
Then we do some similar (but different) stuff with the serial number.
Skip the first eight digits, and save the next ten digits as a "seed" in
another location. Strip the "3" off the hex numbers so they look like real
numbers. (hex "31" ends up as "01", etc.) The neat thing here is that the
numbers come MAINLY from the "seed", but every now and then we pick a
number from the "original" string. After processing a bunch of the numbers,
we end up with three numbers, which are then reduced to a single byte.
(my number string ended up as "A9")
This is done, so it's coding time...
CS:384B 8A86FDFD MOV AL,[BP+FDFD] ;Get the "name" byte (C8)
3A86FCFD CMP AL,[BP+FDFC] ;Cmp to the "number" byte (A9)
7506 JNZ 3857 ;Ohhh... Goto bad hacker!
C646FF01 MOV BYTE PTR [BP-01],01 ;Nice guy! no nag for him!
EB04 JMP 385B ;Go past bad hacker!
C646FF00 MOV BYTE PTR [BP-01],00 ;bad hacker! gets nag screen!
8F06980E POP WORD PTR [0E98] ;continue program start-up
Easy! Change "7506" (on 3rd line) to EB00 (jump to next line) so we
automaticaly drop through to get branded as a "good guy!"
Now of course, the "00" or "01" must be checked to verify if you need
to wait at the nag screen, and having waited there myself a few times, I
wanted to be sure nothing went wrong with this crack. So here's just a bit
more code in case you also think like me.
CS:1B51 26807D1001 CMP BYTE PTR [ES:DI+10],01 ;Is this Good Guy?
751F JNZ 1b77 ;NAG this Bad Hacker!
6A00 PUSH 00 ;Thank You Good Guy!
6A15 PUSH 15 ;On with the program
55 PUSH BP
Again, just break out HexEdit and change "751F" to "EB00" to drop
through to the "Good Guy" stuff.
And thats it! Not alot of code for you to walk through but I think
it's easier to learn if you know whats going on, instead of clogging your
head with source code when you don't have the whole picture. When you start
working on the program yourself, you'll have a good idea of what you can
expect to see, and then you can watch as much, or as little of the program
as you want, to see how everything gets done.
A word of advice... Don't think you can't do it. Three years ago, I
didn't even know how to turn a computer on! Let alone how to make one work.
I had never even touched a keyboard. I bought a computer, and trained
myself, I have never been to ANY computer training, and I don't know any
body who knows anything about computers. (I do know a few people who USE
computers, but they're only doing thier "job" the way they were "trained")
So I had no-one to get advice from. Still I learned.
August 21st, 1996 was my first visit to the internet, "SEARCH" was
my first command to the internet, "ASM" was my first subject, and "FRAVIA"
was the first web page I ever visited. So I haven't even "surfed" the web
for a whole year yet. Still I learned.
I also quit school, and type with one finger. Still I learned. So if
I can do it, you can! This is a TERRIBLE world we all share. We need more
people in this world to be wise enough to outwit those who (try) to control
us. Our good friend +ORC and his scholars tell us alot about what's
going on around us. Listen and LEARN! YOU can do it TOO!
Good-bye, Good Cracking, And stay safe!
You are deep inside reverser's page of reverse engineering,
choose your way out: