Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



 144110

XDumpGO v1.2 (Latest Update) - Cracked by 1x37x - How to Reverse Engineer

by 1x37x - 09 June, 2020 - 04:26 PM
This post is by a banned member (Londonwewewe) - Unhide
13
Posts
1
Threads
3 Years of service
#49
damn this is amazing lol
This post is by a banned member (W451M05) - Unhide
This post is by a banned member (MindTheFlame) - Unhide
7
Posts
0
Threads
4 Years of service
#51
(This post was last modified: 20 December, 2020 - 04:55 AM by MindTheFlame. Edit Reason: mispelling )
Yo, is anyone else having a bunch of trouble getting this to work?
I've tried following the vid but when it says "debug with x64dbg" ... I don't have that in my right-click context menu.
This post is by a banned member (dynamitharry) - Unhide
104
Posts
22
Threads
6 Years of service
#52
THanks a lot for posting man!
This post is by a banned member (JulianCracking) - Unhide
This post is by a banned member (Hulos3) - Unhide
Hulos3  
Registered
7
Posts
0
Threads
3 Years of service
#54
imagine if this works
This post is by a banned member (gaup) - Unhide
This post is by a banned member (Charon1337) - Unhide
97
Posts
21
Threads
4 Years of service
#56
(10 June, 2020 - 07:27 PM)PureWasHere Wrote: Show More
Step by step write up of the video:

Loading The exe:
Step1) Download x64 DBG
Step2) Download the XDumpGo Files
Step3) Open XDumpGo with x64DBG (You can drag XDumpGo into the x64DBG window or press file > Open > Xdumpgo.exe)

Now to find what you need to patch.

Step1) Open the Symbols Tab on the nav bar. xdumpgo.exe should be in the module list. Double click it. The title of x64dbg should now say Module: xdumpgo.exe - Thread <random stuff here>
Step2) click the Run arrow 2 times
Step3) Go to the Memory Map tab
Step4) Locate the Address on the list that says "XDG9" in its info panel. There should be a few. Right click the first one and press "Find refereances to Region"
Step5) That should've opened up the references tab. In the search box at the bottom type "jmp"
Step6) Double click the last result
Step7) Right Click the value that shows up and go into breakpoint and then toggle. The left box should go red.
Step8) Press the Run Arrow 1 Time. The program should stop on that Breakpoint and a box that says RIP with an arrow pointing to the address should appear.
Step9) Right click the value and press follow in the disassembler
Step10) Right click the value and press follow in disassembler again
Step11) The value at the top should now be:mov rdi,qword ptr ss:[rsp]
Step12) Right click that value and go to search > current module > string references
Step13) search for "try again" in the search box
Step14) double click the string that says "Try AgainTypeCNAMETypeHINFOTypeMINFOUarrocir;UnderBar" it is near the bottom
Step15) Press your up arrow 26 times. The top value should look like "jne xdumpgo"

Now you need to apply the changes that bypass the Auth.
Step1) Change the top 4 jne to je by double clicking the value and deleting the n. Press OK then press cancel. DO NOT CHANGE ANYTHING BUT THE "n" OR IT WILL CRASH XDUMPGO.
Step2) After changing the top 4 from jne to je. You should now have a 5th je value at the bottom. Change that from je to jne.

Since x64dbg cannot save these patches to an exe I recommend exporting the patch group so you don't have to redo this process every time you want to run.

can you provide the cracked version?

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 1 Guest(s)