http://www.anwida.com - Webpage.
I've made several key generators before this one but not published them anywhere (for my own educational purpose only). However, I would like to share with you guys how I made this particular keygen. It's not really unique but I think it will give new reversers some more information.
My assumptions are: (I know its not good to assume but it saves my time :) ):
1. You guys know how to use SoftICE (basic is still
2. You have read all the others tutorials. There are many out there!.
Therefore, I don't want to explain in too much detail (it can also make you a spoilt brat as well as discouraging you from venturing into reversing and try coding yourself).
My challenge is:
1. To ask you (new crackers!) to make another keygen from anwida.com (Effect Processor Pro). Same process but slightly different, take that as a drill, exercise, practical too enhance your skill.
2. No detail! it's time to move from beginners to intermediate!, so don't moan if you don't understand what I say here, because if you do you are not ready to make a keygen yet!!! (my assumption again).
This is a good utility, you can also get it along with two other sound utilities (Effect Processor and Parametric Equalizer), I also have made the keygen for the former. The Parametric is too large to download *sigh!*.
I only used SoftICE in making this keygen (saves time). But some of you may want to use other tools such as W32Dasm. Run the program and it'll give you the usual nag screen (I can't remember the exact details because I wrote this text on 18th February 1999). As usual, go to the register box, and fill up your name and fake serial number. Before press the button, the best way (for me) to get the breakpoint is setting bpx hmemcpy in SoftICE.
I'll save you some time here, just use a bpx lstrlen (this API is use to get your name length) and you will break right in the middle of the protection.
First, your name is XORed by a specific WORD (see XORBYTE).
Secondly the result is manipulated by using math routines.
How to get the XORBYTE, math routine, etc. ?, well since I didn't actually write step by step what I do, all I can say is, you need to trace the protection (sorry no detail here). I already gave you the hint (bpx lstrlen). Learn how to backtrace from the many tutorials out there.
I can be contacted at: firstname.lastname@example.org