1 00:00:00,640 --> 00:00:03,010 Hello and welcome back. 2 00:00:03,010 --> 00:00:12,520 Today we are going to create a search engine and this is where you need to find the correct places to 3 00:00:12,520 --> 00:00:17,050 bash the software and to display the Syria key. 4 00:00:17,860 --> 00:00:18,910 So let's get started. 5 00:00:21,820 --> 00:00:28,530 So open correct me 14 the FCC for BBG and run it 6 00:00:33,980 --> 00:00:37,610 now we study the behavior first just click on run 7 00:00:42,110 --> 00:00:50,720 so a window pops up and any first name type ABC. 8 00:00:50,740 --> 00:01:00,530 And for this year key since we don't know these hierarchy we can this time any theory key and click 9 00:01:00,530 --> 00:01:07,030 on the button check and you get the error message. 10 00:01:07,070 --> 00:01:12,070 This is a data box which shows the error message and that's OK button. 11 00:01:12,980 --> 00:01:26,680 So this is our plan but if we crack this code to show these hero key here so we are going to use the 12 00:01:26,770 --> 00:01:35,980 code itself so the assembly code is so modified somehow some way so that instead of showing the string 13 00:01:36,420 --> 00:01:44,170 wrong zero key be making sure the correct 0 key. 14 00:01:44,220 --> 00:01:54,900 So from here obviously here you can see that the program takes the first name and then performs some 15 00:01:54,900 --> 00:01:59,240 kind of uh some kind of operation on it. 16 00:02:00,230 --> 00:02:03,720 To January how is your key. 17 00:02:03,890 --> 00:02:14,140 So now that we see that there's a message showing the wrong hierarchy we can try to find out where this 18 00:02:14,770 --> 00:02:16,860 message box came from. 19 00:02:16,960 --> 00:02:22,210 So to do that we used to call a stack method. 20 00:02:22,210 --> 00:02:30,820 So we'll press the past now and then we go to record say two A's I mean make sure the program is passed 21 00:02:31,810 --> 00:02:35,440 as you can see down here it is fast getting on the concept. 22 00:02:36,620 --> 00:02:45,310 And now we look for the location where the user module caused the system to show the Delta box. 23 00:02:45,310 --> 00:02:50,560 So this is the reason a module makes a call to the system. 24 00:02:51,250 --> 00:02:54,190 So right click on it click follow from. 25 00:02:54,670 --> 00:03:06,760 And the idea location and location after the call was made to the system to show the message box. 26 00:03:07,930 --> 00:03:19,240 So if he's correct for that we can see that data jump over here and the jungle did take place to show 27 00:03:19,240 --> 00:03:26,730 the context here a key Oh it doesn't take place in which case he will show the best message. 28 00:03:27,000 --> 00:03:36,580 He hit that message which is two wrongs Hiroki so it is a good place to put her her point and run it 29 00:03:36,610 --> 00:03:37,570 over here. 30 00:03:37,740 --> 00:03:39,530 Okay. 31 00:03:40,900 --> 00:03:49,180 So now it stops had fine and from here we can see that it is not going to. 32 00:03:49,690 --> 00:03:54,750 It is not going to adjourn because this is greater and therefore you will it will go ahead and show 33 00:03:55,150 --> 00:03:56,570 the least message. 34 00:03:57,730 --> 00:04:05,670 So our strategy is the one to show this hierarchy instead of this message. 35 00:04:05,830 --> 00:04:15,680 So we have to modify this assembly he must modify Assembly so that he is instead of moving a bad message 36 00:04:15,680 --> 00:04:17,650 stream into edicts. 37 00:04:17,900 --> 00:04:21,160 He want to move to zero key into an edicts. 38 00:04:21,410 --> 00:04:22,810 So the strategy is like this. 39 00:04:22,810 --> 00:04:30,970 So let's copy this in selection and put it in the not bad. 40 00:04:32,960 --> 00:04:37,190 So presently we have uh this 41 00:04:39,870 --> 00:04:43,440 let me tell you that a little bit ideally how this 42 00:04:50,170 --> 00:04:58,370 uses were so presently this line is moving the uh wrong serial key string. 43 00:04:58,970 --> 00:05:01,620 So this is the wrong Hiroki string. 44 00:05:01,640 --> 00:05:09,540 It is moving they seem to heed the x and then calling a message in box here to show this message. 45 00:05:09,800 --> 00:05:14,100 But he does not one this um that message to be shown. 46 00:05:14,360 --> 00:05:17,410 He won the 0 0 key division. 47 00:05:17,540 --> 00:05:24,140 So you have to change the uh address here to point to this hierarchy. 48 00:05:24,230 --> 00:05:30,270 So let's look at the lights up here to see where this hierarchy is being stored. 49 00:05:31,070 --> 00:05:37,610 If you look a foot up here you will see a few places where the zero key is there has been generated 50 00:05:38,060 --> 00:05:38,860 is being stored. 51 00:05:39,770 --> 00:05:45,190 So one location is here 7 1 9 1 0. 52 00:05:45,830 --> 00:05:46,980 So over here. 53 00:05:47,000 --> 00:05:57,710 If you click on this and right click here and if you go following them this address and here this address 54 00:05:57,740 --> 00:06:01,590 you will see the zero key. 55 00:06:01,640 --> 00:06:03,650 So this hierarchy is being stored here. 56 00:06:03,670 --> 00:06:07,510 Here we see these 3 2 5 4 3 2 9. 57 00:06:07,550 --> 00:06:13,720 So what we're going to do is you want to you're going to copy this address and replace it here. 58 00:06:13,760 --> 00:06:25,900 So what we do we now cockiness 9 called PD 9 called piece nation 59 00:06:28,970 --> 00:06:29,800 here and based it. 60 00:06:30,760 --> 00:06:42,610 And what we won is this address so you copy this address and here we replace it is. 61 00:06:42,640 --> 00:06:50,460 So this is why we do you won this so you are going to do it like this. 62 00:06:50,490 --> 00:06:53,260 This is your original line. 63 00:06:53,310 --> 00:06:56,730 You want to replace this. 64 00:06:56,820 --> 00:06:58,470 Yes. 65 00:06:58,770 --> 00:07:02,490 So we double click this location here and this part here. 66 00:07:03,120 --> 00:07:04,140 Yes change is 67 00:07:07,430 --> 00:07:10,190 changed the address to this address. 68 00:07:10,190 --> 00:07:16,850 Copy this and is here and then make sure that the size is the same. 69 00:07:16,850 --> 00:07:17,510 All right. 70 00:07:17,580 --> 00:07:18,230 Same size. 71 00:07:18,710 --> 00:07:20,030 OK. 72 00:07:20,210 --> 00:07:20,670 All right. 73 00:07:20,750 --> 00:07:22,780 Now close it. 74 00:07:22,940 --> 00:07:26,380 So now you see he's copying the bad message to. 75 00:07:26,390 --> 00:07:26,640 Yes. 76 00:07:26,650 --> 00:07:28,920 We are now copying a secret key. 77 00:07:29,000 --> 00:07:37,760 We are now copying the location in memory address which tossed this hierarchy into ATX so Navy running 78 00:07:39,860 --> 00:07:42,970 as you see our error message. 79 00:07:42,990 --> 00:07:44,970 So showing us a that string. 80 00:07:45,010 --> 00:07:47,350 It is showing this hierarchy. 81 00:07:47,490 --> 00:07:47,810 All right. 82 00:07:47,840 --> 00:07:49,800 Let's leave it at that. 83 00:07:50,210 --> 00:07:57,040 Now this series is in compete on these Hiroki we do need this now. 84 00:07:59,050 --> 00:08:13,510 We need it is year so the zero keys heavy dash 3 2 5 4 3 2 9 3 2 5 4 3 2 9. 85 00:08:13,550 --> 00:08:13,940 All right. 86 00:08:14,390 --> 00:08:21,600 So we are going to copy this hero key okay and pacing here. 87 00:08:22,050 --> 00:08:22,900 A quick check. 88 00:08:24,140 --> 00:08:24,440 All right. 89 00:08:24,830 --> 00:08:32,420 So now your response here is to run and see what happens and true enough it is correct. 90 00:08:32,630 --> 00:08:33,760 Can I see Ricky. 91 00:08:34,100 --> 00:08:43,250 So that is not a spam and not a first name and see where it is to see what's so let's put maybe my own 92 00:08:43,250 --> 00:08:59,440 name and name here we can just type anything get an inkling run and now it tells us this here is this. 93 00:08:59,440 --> 00:08:59,770 OK. 94 00:08:59,780 --> 00:09:14,750 So now we copy this Hiroki be a you have my name and followed by 3 2 5 4 3 2 9. 95 00:09:14,830 --> 00:09:19,180 Copy this and they can make here. 96 00:09:19,190 --> 00:09:28,480 Okay and based in the hierarchy feature they run and is correct. 97 00:09:28,500 --> 00:09:34,720 So we have created like Keegan out of the program itself. 98 00:09:35,370 --> 00:09:35,640 All right. 99 00:09:35,730 --> 00:09:36,760 So an unexpected. 100 00:09:37,290 --> 00:09:44,900 So we go here and click file batch file and discrete patch file. 101 00:09:45,910 --> 00:09:46,220 Yes. 102 00:09:46,230 --> 00:09:46,900 Yes. 103 00:09:46,940 --> 00:09:47,990 Doesn't matter. 104 00:09:48,280 --> 00:10:00,080 To say yes and click on this and just give it a suffix call it to badger and say to purchase apply click 105 00:10:00,080 --> 00:10:01,530 OK here. 106 00:10:01,570 --> 00:10:03,730 Now we can test our patch. 107 00:10:03,920 --> 00:10:04,280 Right. 108 00:10:05,510 --> 00:10:07,730 And this click anything up here. 109 00:10:08,450 --> 00:10:09,230 All right. 110 00:10:09,230 --> 00:10:13,730 Maybe make any here. 111 00:10:14,270 --> 00:10:15,680 This time anything. 112 00:10:16,050 --> 00:10:17,420 Click check. 113 00:10:17,830 --> 00:10:29,180 And it tells us our series My 3 2 5 4 3 2 9 so our security is Mike 3 2 5 4 3 2 9. 114 00:10:30,800 --> 00:10:31,310 OK. 115 00:10:31,430 --> 00:10:32,470 So now. 116 00:10:32,900 --> 00:10:42,660 OK we copy this here key chain pacing here check. 117 00:10:42,910 --> 00:10:43,420 He's correct. 118 00:10:44,420 --> 00:10:44,690 OK. 119 00:10:44,770 --> 00:10:48,980 So this is how we create a kitchen a self keeping. 120 00:10:49,240 --> 00:10:52,610 And this is the easy way to create kitchen. 121 00:10:52,750 --> 00:10:56,440 We may use all the existing code to create a kitchen. 122 00:10:57,160 --> 00:10:59,280 So the trick is let me just repeat. 123 00:10:59,500 --> 00:11:06,850 Find out where the message box is being shown and we find out the message what is being shown here. 124 00:11:07,710 --> 00:11:18,640 He's being shown here and then the net find out how to modify the string that is to be shown and to 125 00:11:18,640 --> 00:11:21,640 replace it with zero key instead of the error message. 126 00:11:22,300 --> 00:11:26,860 So to find the hierarchy you need to look for where the series may start. 127 00:11:27,910 --> 00:11:31,550 So there might be some hunting for this program. 128 00:11:31,600 --> 00:11:38,550 The for this program the end is quite easy because this hierarchy is great here but sometimes you may 129 00:11:38,560 --> 00:11:45,290 need to dig into some of these calls to look for this hierarchy where it is being stored. 130 00:11:45,550 --> 00:11:53,840 And once you engage your threats of failure as Iraqis Minister you just assemble the address inside 131 00:11:53,860 --> 00:12:00,490 here to replace uh the that message string with this hierarchy address. 132 00:12:01,330 --> 00:12:01,900 So that's it. 133 00:12:02,170 --> 00:12:03,970 So thank you for watching. 134 00:12:03,970 --> 00:12:05,520 I'll see you in the next as in.