-=Cracking Phek Techs Crackme v2.0=-
                                by:tarq

                           -=Tools needed=-
                                Softice

                            -=Protection=-
 Manipulates the Username entered and compares it with serial entered

                            -=Lets Begin!=-
Ok, start the crackme, enter your fake Name and serial, i use Orion
123456. Now, what should we break on ? Lets try the usual getwindowtexta and getdlgitemtexta. Hmmm...no...didnt work. Well, maybe hmemcpy will help us out. Set a bpx on hmemcpy and press Test!.

:bpx hmemcpy

we breaked in. Ok, new lets go to the real code, press f11 once.
Dont forget to dissable the breakpoint with bd. After u pressed f11,
press f12 10 times to get to the right place. We are now in the file 
crackme, as u should se at the lower menu in softice. And now we also might know why it didnt break on getwindowtexta. Its 16 bits...
Anyway, press f10 twice, and do:

:d di

Now u can se your name that u used. Ok..lets trace some more..
As you trace you can see how the program manipulates you name.
Stop tracing when u come to a place with 2 calls, an a conditional jump
after them. This is how it looks for me

2A17:02D9   CALL ****:****
2A17:02DE   CALL ****:****
2A17:02E3   JNZ  ****:****

Ok..this might be something interesting. The jump is probable controlled by the last call, so lets enter it with F8. Trace with F10
5 times, the do:

:d di

Hey, whats that ?

:d si

Maybe we founf something interesting, u have now found you code, and
your username with alot of stuff around it. Write it up and try using it as the code. For me it was: g3dfOriong3dfOrionh9cf8

Press test. You get YEAH! GOOD WORK message :)

Keygenning this would be fun...try it!


If you got any questions or just wanna say hello:
ingetalls@hotmail.com

Thanks to all guys in #cracking4newbies, and all authors of crackmes
and crackme tutorials.

tarq