MCSE MCNE tests - BeachFront Quizzer
(Visual Basic: the weak point inside VBRUN300.DLL)
by +drlan
(7 November 1997)
Visual Basic reversing
Courtesy of fravia's page
of reverse engineering
Well, an 'add-on to Razzia's tutorial with a very interesting
trick ("another twist on cracking VB" as +drlan writes).
Here is what +drlan (who is the author -inter alia- of an important essay
about MKS Toolkit Release 5.2) wrote to me:
Fravia+,
The enclosed essay doesn't present any new rocket science to our art but
it does combine a few tricks that may be of use to folks. It highlights
an area where I had difficulty early on and presents an easy way to get
around it. This will make it more enjoyable for the students and save
them some of the pains I encountered.
Enjoy,
+drlan
Target Program : BeachFront Quizzer
Protection : demo, serial numbers to unlock tests
Cracked by : drlan [ME97]
Location : http://www.bfquiz.com
Tools needed:
- SoftICE Win95
- Hex Editor (I like PSEdit and Hex Workshop)
Conventions used:
> denotes a SoftICE command
This program is designed to help students prepare to take the Sylvan/
Prometric (formerly Drake) tests for Microsoft and Novell products. It
is similar to CNE Quizzer, Transcender, etc. BeachFront has an entire
library of self-tests for both Microsoft and Novell. So, if you want to
take some of your MCSE or MCNE tests, these are great study aids.
Let me say right up front that this is a tutorial only. I am not going
to hand out serial numbers here for lamers. The intent of this tutorial
is to provide you (the cracker) with another approach for defeating those
damn Visual Basic apps. So, if you're just looking for serials, then go
elsewhere. If you want to learn another twist on cracking VB, then please
read on!
Download the target (the testing module) and a few of the self-tests. Run
it a few times to get a feel for what's going on. You'll notice that the
only test you can actually try is the "demo" one with limited questions.
When you try to run one of the real tests, it asks you to enter a 12 digit
"database key."
I already mentioned that this is a VB application, so our standard approach
of dis-assembling or playing in SoftICE will not work (or at least will not
be all that much fun).
I want to take a moment here to extend a very warm thank you to Razzia. It
was Razzia who did the hard work which makes this essay possible. His essay
on cracking VB apps is one of the best I've ever read. However, early on in
my cracking career, for some reason I had trouble following the essay and I
just had a hell of a time trying to crack VB programs. I fully understand
it now and appreciate it for what it is. My intent here is to save some of
the newbie crackers from losing hair over VB apps and to save Razzia from
people asking too many questions about his wonderful essay.
So here goes...
We know from Razzia's work that VB apps typically do their comparisons like
this:
[borrowed from Razzia's essay]
Step 8: Now we have found the code where the VB3 dll does the comparing
we can now place a breakpoint there and disable the other breakpoints. We
won't need them anymore. We HAVE FOUND the place where things get compared
in VB3. What you see is this :
:The_VB3_compare_snippet
: 8BCA mov cx, dx
: F3A6 repz cmpsb ;
Now that we know where VB 3 does its string comparing, we know "where" to
set our breakpoint. Then we can see what it compares (the right string)
with the string we entered. Razzia suggests using SoftICE to do a search
for the hex values of the instructions (while you're in the code of the
VBRUN300.DLL) and this is what I always had trouble with. I could never
get sICE to find the code segment this way.
However, I know a little trick that I learned from my good friend josephco
that will allow me to do exactly what I need to do here and that is break
in right on that MOV CX, DX. The trick is to hex edit the file and stick
in some instruction that we know we can break on (like an INT 3). The hex
value for an INT 3 is CC. So, make a backup copy of your VBRUN300.DLL...
Then open it in your favorite hex editor and search for the above code
block. This search string will be unique:
8BCAF3A674019F928D5E08E80E06
Once you've found it, change the 8B into CC. Now we have an INT 3 stuck in
right at the beginning of the compare routine. We definately do not want
this instruction to execute, so before you do anything else, go into sICE
and set a breakpoint on int 3.
>BPINT 3
Okay, now you can run the target. It will break on the INT 3 because it
must be doing some other string comparison work. IMPORTANT: when it does
break, you must assemble back in the original instruction (MOV CX, DX) so
it does not execute the INT 3. If you skip this step, your system will
crash! So, after SoftICE breaks on the INT 3, assemble back in the old
instruction.
>A
>MOV CX, DX
>press ESC
Let's "clear" all existing breakpoints now.
>BC *
Now, set a new breakpoint on the MOV CX, DX line. You can do this by just
double clicking on the line if you have mouse support enabled. Or, type
BPX ssss:oooooooo (where ssss is the segment and oooooooo is the offset).
So, now we have the original instruction assembled back in place and we
have a breakpoint set there so we can pop in right before the magic moment.
Before you toggle back over to the program (using Ctrl-D or F5), let's go
ahead and "disable" this breakpoint for now (otherwise it will pop several
times before we really need it).
>BD *
Okay, now toggle back over and select a self-test. Type in a 12 digit key
but don't click OK yet. Toggle back in to SoftICE (Ctrl-D) and "enable"
the breakpoint.
>BE *
Toggle back to the app (Ctrl-D or F5) and now click on OK. You should be
staring at a SoftICE screen now and sitting on the MOV CX, DX line.
We know (again from Razzia) that VB 3 is about to compare what's in ES:DI
with what's in DS:SI. So, let's "display" what's there in memory. In this
case ES == DS, so:
>D di ; should be the 12 digit number you entered
>D si ; yeeha; the correct number! (only the first 12 digits)
You can save yourself a few keystrokes by editing your breakpoint and
making it do the "D si" for you. To do this:
>BPE 0 ; edit breakpoint 0
Remove the # in front of your address and add this to the end of the line:
DO "d si"
So, your new breakpoint should look something like this (if you do a BL).
00) BPX #2B67:00008CAF DO "d si"
You'll want to "disable" it before you toggle back to the program to try
a different test module, otherwise it will break several times and slow
you down. Then once you're ready to find another key, just toggle back
to sICE (Ctrl-D) and "enable" the breakpoint.
Since you already have your breakpoint set, you can loop through all the
tests you want and find out all the correct "database keys." Again, I am
not going to list any of them here. Sorry, lamers...
VERY IMPORTANT: Do not forget to restore your backup copy of the VB dll
(VBRUN300.DLL). You may want to save your debug version as vbrun300.cc
just in case you need to do another exercise like this sometime. :-)
I use this same trick a lot when I know where I want to break in on a
target but have troulbe pin pointing it. I just stick in an INT 3 and
BPINT 3, then re-assemble the old instruction back in. It works quite
well and can save a considerable amount of time when you're "seeking the
needle in the haystack."
This same technique should work equally well for VB4 (and perhaps 5).
From Razzia's earlier essay, we know VB 4 usually does its compares like
this:
[borrowed from Razzia's essay]
I have done all the hard work for you and found the VB4 dll code
that compares two strings (in WideChar format !).
Heres the listing :
: 56 push esi
: 57 push edi
: 8B7C2410 mov edi, [esp + 10]
: 8B74240C mov esi, [esp + 0C]
: 8B4C2414 mov ecx, [esp + 14]
: 33C0 xor eax, eax
: F366A7 repz cmpsw ;
So, just stick an INT 3 (CC) in place of the push esi (56) and you're on
the track...
That's it for this lesson. Hope this was fun and instructional.
Disclaimer: THIS ESSAY IS FOR EDUCATIONAL PURPOSES ONLY. ANY USE, MIS-USE
OR ILLEGAL ACTIVITY IS THE SOLE RESPONSIBILITY OF THE READER.
Personal GreetZ: Razzia, josephco, niabi, fravia+, +gthorne and +ORC!
drlan
(c) +drlan. All rights reversed
You are deep inside fravia's page of reverse engineering,
choose your way out:
project8
homepage
links
anonymity
+ORC
students' essays
academy database
tools
cocktails
antismut CGI-scripts
search_forms
mail_fravia
Is reverse engineering legal?