Cracking all nag-screen and time-trial protections
(Aerial32 as example)
(Resource-ID fishing)
by Snatch
(13 November 1997, slightly edited by fravia+)
Courtesy of fravia's
searchlores.org
Well, a short exposition by Snatch, about Aerial,... see
JimBob's essay about the interesting use
you can make of Aerial (an Acrobat Reader's Add-on) in order to snatch pdf-protected
files from pdf-format.
I would like to ask Snatch to 'deepen' a little the subject: of
course we cannot expect to find always a cmp, 0x1E when there is a 30-days trial, so 'a couple of lines' more, on how exactly Snatch finds the 'correct' time-checking code-snippets inside his targets, would be appreciated (and this essay will be updated as soon as Snatch sends them :-)
Cracking all nag-screen and time-trial protections (Aerial32 as example)
By Snatch
Cracking nag-screens is a straightforward process.
You will need the following:
Resource editor (Symantec or Borland recommended)
Disassembler (IDA 3.7 recommended)
Hex editor (I have a simple one called hex for dos and it gets
the job done fine!)
Aerial (see JimBob's essay on the PDF-Project page).
That is it!
Now, let us get on to the crack.
Let us load up the resource editor and load the target, aerial32.api.
API files are the same as EXEs or DLLs with a different extension to
make them unique for Acrobat.
If you look through the dialog resources, you will find one that looks
a lot like your nag-screen, without some of the text.
Write down the ID of this dialog.
If you cannot find the dialog, the program you are cracking will
take extra effort to crack, because it may use LoadResource or a
DLL call to load the resource, not defining it in the resource directory.
Nevertheless, only a VERY advanced programmer could do this.
Now lets load up the disassembler. Your disassembler better have a
search option, so use it and search for the ID, in hex or decimal
depending on the disassembler options (normally hex).
For Aerial, the ID happens to be 206 or 0CEh.
If you search your disassembly for a 0CEh, you should find:
1001EC8C push eax
1001EC8D mov ecx, esi
1001EC8F push 0CEh; lets change this to 0
1001EC94 call sub_100646E0
This is obviously the correct location, because it is too
coincidental for another 0CEh to occur like this.
However, with a value like 0FFh, you may have to take some serious
time to figure out the correct routine. If you are not sure, keep
searching, which I did and found nothing else that comes close.
There are usually two ways to go about patching this: if there is a
jump, jump around this, or change the ID to zero.
In this case, we must change the ID to zero, because there is not
a jump.
There is a date check around this area, but do not get suspicious,
it is not what ends the program, it simply gets the information for
the dialog. The real date check is at 1001F7B4.
There is compare with 1E before it, 30 being the trial time.
This is what I searched for, but if this is not the case, you should
just look for the code that the dialog enters into for the date check
for example, when they click OK. This can be located by finding the
loading of the resource. Alternatively, you can look further on down
in the code in that section, because this is usually where the check
is, as it is in Aerial.
Whenever there is a date check near the routine, still scan on down
the routine for other possibilities.
Here is the misleading code of the date check that is printed on
the screen, that you can find by tracing the call at 1001EC94 to
the DialogParamA loading which contains the dialogs interface routine:
1001EEAF push offset a79_95
1001EEB4 mov ecx, [ebp+var_10]
1001EEB7 push offset aAerial
1001EEBC mov eax, [ebp+var_14]
1001EEBF push 1Eh; time trial days left
1001EEC1 mov edx, [ecx+6Ch]
1001EEC4 push edx
1001EEC5 push offset aAerial; window title
1001EECA push offset aSEvaluationCop; message
1001EECF push eax
1001EED0 call _sprintf; thanks ida!
Here is the right code:
1001F7AA mov [ebp+var_4], 0FFFFFFFFh
1001F7B1 cmp esi, 1Eh; awful protection! compare with 30
1001F7B4 jle short loc_1001F7C0; good guy with time left
1001F7B6 call sub_1001F7D9; sorry trial over
You could have also found this code by just looking at the api calls,
there is a call to getprivateprofilestring so it is using ini files.
Also look for names like eval... in IDA. There XREFs are interesting.
Summary of patch:
File offset 1E090 - 00 (from CE) - do not load the nag dialog
File offset 1EBB4 - EB (from 7E) - force the jump
There you have it, cracking all (well at least almost all) nag-screen
and time-trial applications.
And an useful tool to work on the PDF-project too.
Snatch '97
(c) Snatch 1997. All rights reversed
You are deep inside fravia's searchlores.org,
choose your way out:
[basic.htm]
[advanced.htm]
[intro.htm]
[annoyanc.htm]
[pdffing.htm]