Skip to main content

How to crack Power ISO | Reverse Engineering

p> 


You might have heard about Powe ISO software of windows. PowerISO is a powerful CD / DVD / BD image file processing tool, which allows you to open, extract, burn, create, edit, compress, encrypt, split and convert ISO files, and mount ISO files with an internal virtual drive. It can process almost all CD / DVD / BD image files including ISO and BIN files. PowerISO provides an all-in-one solution. You can do everything with your ISO files and disc image files. it is like the WinRAR software. you should check their website for once.

If you have ever used this, you must know that there are some limitations to demo software. or you can call it some frustrating things. you will see in the demo that you have to wait for some time before using the software. we can remove that too. but we won’t need to do that. we are going to bypass the registration. it means that no matter if we have the right key or not, once we will enter it, the software will get registered.

ATTACK

First of all, download the demo of this software in your windows from their website. and then simply, install it.  Now we need some reverse engineering software. I am using the IDA pro and W32DASM disassembler. after downloading these, you are totally good to go.

Let’s see what can be done to crack the PowerISO. open the PowerISO to examine what is going to be bypassed.

Screenshot:

Screenshot:

Try to submit this and you will see some error. all we need to focus on are strings that are being used while registration. so, a unique string is “user name”.

Now, open the W32DASM and load the poweriso.exe to find the string in disassembly. Go to (top left)disassembly>Open File to Disassemble

Screenshot:

Well, we have the program in disassembly. now we can search for the string “invalid” or “serial”. because we got this string while registering with the wrong code.

Go to (top left) Search>Find Text

Screenshot:

So, get the offset of push instruction. it can be something else for you. but in my case, it is 0x0007FA8C

Screenshot:

Now that you have noted the offset value, we can use IDA pro to run the PowerISO with breakpoints. I don’t think I need to tell you how to load a file in IDA. you can do it yourself.

After loading the file, press ‘G‘ to go to the offset you found in disassembler. you will see something like this.

Screenshot:

The arrow is denoting the same push instruction we got in disassembly. you may have a question that doesn’t the windows change the memory address each time like Linux. well, the working of ASLR in windows and Linux are slightly different. I don’t know much about it too. but I have heard that most of the windows programs don’t allow ASLR in their programs and mostly, games. it reduces the performance of the program or software.

if you are interested to know more about Linux and Windows ASLR, you should check out this question I asked on StackExchange.

let’s done with extra knowledge. look closely, you will see that there is a jump  which is producing this push instruction. so, add a breakpoint at the jump by pressing F2.

Screenshot:

Start the program (top left) and enter the registration code as we did before.

Screenshot:

once you will press “ok”, the execution of the program will stop at the jump.

Screenshot:
If you will press enter, you will see that it is the same message, you were getting before. sp, now we know that we can bypass this jump(jnz) to get some other output which will redirect us to a valid message.

And I am leaving this up to you so, you may do something yourself. all you need to do is change the jnz to jz. do it manually, use opcodes or with anything else. I am assured that it will teach you something more.

 

 

Thank you



Comments

Popular posts from this blog

What is Bug Bounty in Cyber Security 2022?

Task 1 | What is Penetration Testing? Before teaching you the technical hands-on aspects of ethical hacking, you'll need to understand more about what a penetration tester's job responsibilities are and what processes are followed in performing pentests (finding vulnerabilities in a client's application or system).   The importance and relevancy of cybersecurity are ever-increasing and can be in every walk of life. News headlines fill our screens, reporting yet another hack or data leak.   Cybersecurity is relevant to all people in the modern world, including a strong password policy to protect your emails or to businesses and other organizations needing to protect both devices and data from damages.   A Penetration test or pentest is an ethically-driven attempt to test and analyze the security defenses to protect these assets and pieces of information. A penetration test involves using the same tools, techniques, and methodologies that someone with malicio...

WHAT IS SESSION HIJACKING?

  What is Session Hijacking? A session is the period of time when you as a user are actively accessing an application, website, or other online service. Each user session begins when you log into a website or app and ends when you log out of it. For example, when you type your username and password into a banking application, that begins your session on that online application. When you log into an online application, for example, amzon.com, their server typically generates a temporary session cookie in your browser. This cookie tells your browser that you are logged in and have been authenticated on the server by Amazon. Each temporary session cookie is marked by a unique session ID, or key. If a hacker is able to access your unique session ID, they can access your session. Let us take the example of Facebook. For example, when you log into Facebook, a session begins. This allows you to keep using Facebook (even if you close and reopen the web browser) until you click on ‘log out’...

How To Make Personal Diary And Notes On WhatsApp, Learn These Special Tips

  In today’s era, the use of smartphones is constantly increasing, WhatsApp is the most special app on smartphones and it has become a special part of people’s lives as well. It is being used for personal and office work. Constantly new updates have been coming on WhatsApp, but in this report, we have been giving you some special tips with the help of which you can make a personal diary or notes on WhatsApp. Let’s know. We do most of our work from our smartphone only. In such a situation, when we have to note some important things or make a list, we share it on phone notes or WhatsApp. Many times, from office to personal work, we also share on WhatsApp. We write our important thing or any message and send it to any of our family members or friends on WhatsApp. Doing this can sometimes result in frontal confusion, so today we are telling you the trick of such a big work of WhatsApp which you can use to save your important work or any document. You can also use your WhatsApp like a p...