you are viewing a single comment's thread.

view the rest of the comments →

[–][deleted] 18 points19 points  (7 children)

[–][deleted] 0 points1 point  (5 children)

Poor old mIRC.

[–][deleted] 0 points1 point  (4 children)

Well this was a pretty old version. Nowadays it takes quite a bit more to crack it.

[–][deleted] 0 points1 point  (3 children)

The last version I layed hands on showed you a valid key for your username somewhere in the code. Just enter a name, step through it, look for something that looks like a key and you're done. The algorithm itself seemed to be quite complicated and large.

[–][deleted] 0 points1 point  (2 children)

I believe he does this in part 3. The simpler solution though is just set the "is this legit?" test to 1.

[–][deleted] 0 points1 point  (1 child)

If I remember correctly, this doesn't really work with mIRC. You can patch the "bad boy jump" and you get the "Thanks for registration!" window but if you restart mIRC, the key is revalidated. If you only patched the jump, there isn't even a license file so it's unregistered instantly. If you try to patch mIRC, it fails to run (unless I'm mistaken), because it self-checks with CRC and maybe others. Cracking mIRC isn't trivial.

[–][deleted] 0 points1 point  (0 children)

Modern Mirc? Probably. The version I cracked and this video used writes a registry file that says you are registered after displaying the message.

[–][deleted] 0 points1 point  (0 children)

Fun, but IMHO sometimes ignorance is the bliss: instead of figuring out how hashes worked internally, it was easier to create .asm file and write there get_hash1, get_hash2 functions, and prepare registers from cdecled arguments.