الفريق العربي للهندسة العكسية
VMProtect Linux HWID bypass help [Request] - نسخة قابلة للطباعة

+- الفريق العربي للهندسة العكسية (https://www.at4re.net/f)
+-- قسم : ENGLISH FORUM (https://www.at4re.net/f/forum-6.html)
+--- قسم : General Discussion (https://www.at4re.net/f/forum-13.html)
+--- الموضوع : VMProtect Linux HWID bypass help [Request] (/thread-3130.html)



VMProtect Linux HWID bypass help [Request] - kesfaw - 24-06-2022

Hi mates,

I have an ELF binary that is locked or bound to a specific device by HWID using VMProtect. On the other hand, the binary cannot run on other PC/system. Please help me bypass it. I don't need to unpack it, just want to remove the hardware lock.

Below is the attachment for the ELF binary
https://mega.nz/file/9AIxxAyC#YFEOalPT5OqYkE3l0MvGYZsF2xk6IpTPIbbyZKMg3Dg

My solution
I tried to find the HWID in the binary, and simulate it on my PC to bypass the lock.

What did I do?
The above sample ELF will try to load uuid.so to reckon the HWID of the machine. From this point, I tried to follow that syscall to find out what is HWID of my PC, and what is the existing HWID in the ELF used to compare with. But, no luck. The flow wrapped by VMProtect binary is too complicate for me. Any help that figures it out would be great.

help  Thanks for reading


RE: VMProtect Linux HWID bypass help [Request] - mohamad - 24-06-2022

link encrypted


RE: VMProtect Linux HWID bypass help [Request] - kesfaw - 27-06-2022

Sorry! The provider Mega locks the attachment somehow. I upload it to mediafire instead.
https://www.mediafire.com/file/d36rwfuhbn44ep3/crackme_pass123.7z/file

Pass to unzip: 123


RE: VMProtect Linux HWID bypass help [Request] - kesfaw - 29-06-2022

[font][font].One glue is that the attached ELF binary will call uuid.so. From there, we are very close to the point of HWID check.[/font][/font]