![]() Just changing the statement a bit allows me to enter incorrect product keys and have the program think they're valid product keys.Ĭan I do something similar using OllyDbg and your method to debug 16-bit DOS applications? Or would that just be for Windows applications? Thank you for taking the time to document your progress. A lot of times, I'll be able to trace it back to a JMP statement or a conditional JMP statement. Then I would search those strings for the message, in this case, the See Ya! Then I would use OllyDbg to find all references to that text string. Could your technique with OllyDbg be used to crack old DOS programs? The ones that are detected as DOS MZ?Īlso, when I've cracked some Windows applications, I would use OllyDbg to search for all referenced strings. I still have to learn about breakpoints and everything though. I'm not very good at using software like OllyDbg yet but I've messed around a little. To me, this is extremely valuable documentation and I love how you included screenshots and described what you did, what worked and what didn't.
0 Comments
Leave a Reply. |