Just to make sure ...

06/30/2012 22:20 badguy4you#1
before i try to make anything i want to make sure is it possible to bypass the password encryption in conquer.exe only by ollydbg ? i mean just jmp the area which encrypts the password

i am speaking about Conquer V8000 not 5620
06/30/2012 22:55 Zeroxelli#2
What is V8000?

Yes, it should be possible. It was fairly simple back in 4XXX, and shouldn't be too much harder in 56XX
06/30/2012 22:58 badguy4you#3
V8000 Is the pirate beta test client its pretty good to work with
06/30/2012 23:01 Zeroxelli#4
Ah alright lol. Well in any case, yes.
06/30/2012 23:06 badguy4you#5
so maybe harder you are not sure but not impossible to do that [only] in ollydbg
06/30/2012 23:15 Zeroxelli#6
It is probably harder, but no, not impossible. Whenever you have a string stored in the memory, which is then passed to a function, you can always NOP the JMP leading to the function or modify the function (slightly harder) to keep the value the same. The only thing you have to keep an eye out for is making sure the un-encrypted password ends up in the same memory space as the encrypted password would. Someone else would probably be able to explain it better.
07/01/2012 00:19 badguy4you#7
so i have to unpack conquer.exe to work with it or something like this or i can straight work with olly ?
07/01/2012 00:25 Zeroxelli#8
I don't think it's packed, you should be fine just working with it in Olly.
07/01/2012 01:17 romeoromeo#9
check this .
[Only registered and activated users can see links. Click Here To Register...]
07/01/2012 01:33 Zeroxelli#10
That guide is not related to bypassing the password encryption lol
07/01/2012 01:35 romeoromeo#11
Quote:
Originally Posted by Zeroxelli View Post
That guide is not related to bypassing the password encryption lol
yes i know , its related to what i thought is called packer .... the proccess is always terminated .
07/01/2012 02:36 Zeroxelli#12
It's not related to packets either lol and that's probably a problem with your system