MIAIONE 发表于 2022-10-30 19:23

C# CrackMe .NET 7 RC1 + AOT [附pdb]

无加壳+无混淆, 有pdb文件, 难度自选, 回复请注明是否使用pdb
https://miaione.lanzoum.com/id0j00euqn3c

BlackHatRCE 发表于 2022-11-1 00:53

本帖最后由 BlackHatRCE 于 2022-11-1 01:07 编辑

ONE BYTE PATCH ONLY

Easy work to do :D
STEPS -

[*]Load the File into Debugger.
[*]Navigate to the call which is responsible for validating the key. (You can find it easily via debugging)
[*]Reverse the Call function.
[*]Boom :D Profit.


Note : It is not a perfect solution as I just manipulated the call to success only.



It was pretty easy :)
I did not follow the hard way as I was in hury to solve it.

MIAIONE 发表于 2022-11-17 16:00

本帖最后由 MIAIONE 于 2022-11-19 11:05 编辑

BlackHatRCE方法正解,本周公布源代码(没啥技术含量)
------------------2022/11/19---------------------------
github: https://github.com/MIAIONE/AntiCrack2022

fanvalen 发表于 2022-11-1 00:41

00000004255CFD70   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
页: [1]
查看完整版本: C# CrackMe .NET 7 RC1 + AOT [附pdb]