Page 2 of 3 FirstFirst 123 LastLast
Results 16 to 30 of 33
  1. #16
    LongBallss's Avatar
    Join Date
    Aug 2012
    Gender
    male
    Posts
    1
    Reputation
    10
    Thanks
    0
    I did the same thing but mine still doesn't work. Help please.

  2. #17
    NSixx's Avatar
    Join Date
    Oct 2011
    Gender
    male
    Posts
    244
    Reputation
    12
    Thanks
    246
    My Mood
    Amused
    It doesnt work for me o.0 it just says it's injecting and remains there, then perX goes away and nothing happens. LOL
    If we don't end war, war will end us.

  3. #18
    ed144's Avatar
    Join Date
    Apr 2012
    Gender
    male
    Posts
    13
    Reputation
    10
    Thanks
    0
    My Mood
    Confused
    when i try opening it, it immidietly crashes

  4. #19
    Departure's Avatar
    Join Date
    Nov 2010
    Gender
    male
    Posts
    805
    Reputation
    125
    Thanks
    1,794
    My Mood
    Doh
    Good work Shim but this is not polymorphic... otherwise you wouldn't need to encrypt it again after is gets detected... just in case you have mistaken the difference https://en.wikipedia.org/wiki/Polymorphic_code beside from that great job, I haven't tested yet But I can already picture your method..
    DJector.Lite
    Get the advantages of new injection technology, with 1 click easy to use injector, work for all platforms x86/x64

    Download

    D-Jector
    Get the most advanced and full featured injector around, works for any game and any platform x86/x64, nothing comes even close.
    Download

  5. #20
    Jason's Avatar
    Join Date
    Apr 2010
    Gender
    male
    Location
    /dev/null
    Posts
    5,704
    Reputation
    918
    Thanks
    7,676
    My Mood
    Mellow
    Quote Originally Posted by Departure View Post
    Good work Shim but this is not polymorphic... otherwise you wouldn't need to encrypt it again after is gets detected... just in case you have mistaken the difference https://en.wikipedia.org/wiki/Polymorphic_code beside from that great job, I haven't tested yet But I can already picture your method..
    >Attempts to patronize SChiM about encryption

    Lols will ensue.

    Quote Originally Posted by Jeremy S. Anderson
    There are only two things to come out of Berkley, Unix and LSD,
    and I don’t think this is a coincidence
    You can win the rat race,
    But you're still nothing but a fucking RAT.


    ++Latest Projects++
    [Open Source] Injection Library
    Simple PE Cipher
    FilthyHooker - Simple Hooking Class
    CLR Injector - Inject .NET dlls with ease
    Simple Injection - An in-depth look
    MPGH's .NET SDK
    eJect - Simple Injector
    Basic PE Explorer (BETA)

  6. #21
    Departure's Avatar
    Join Date
    Nov 2010
    Gender
    male
    Posts
    805
    Reputation
    125
    Thanks
    1,794
    My Mood
    Doh
    No patronizing about it, just stating facts, I 100% agree that each time the stub is built it is different, but that is not polymorphic, as the code is not mutating each time it is executed. And strangely enough encryption is one of my favorite topics as an active member in the malware and RCE scenes for last 6 years.
    Last edited by Departure; 08-26-2012 at 12:32 PM.
    DJector.Lite
    Get the advantages of new injection technology, with 1 click easy to use injector, work for all platforms x86/x64

    Download

    D-Jector
    Get the most advanced and full featured injector around, works for any game and any platform x86/x64, nothing comes even close.
    Download

  7. #22
    Jason's Avatar
    Join Date
    Apr 2010
    Gender
    male
    Location
    /dev/null
    Posts
    5,704
    Reputation
    918
    Thanks
    7,676
    My Mood
    Mellow
    Quote Originally Posted by Departure View Post
    No patronizing about it, just stating facts, I 100% agree that each time the stub is built it is different, but that is not polymorphic, as the code is not mutating each time it is executed. And strangely enough encryption is one of my favorite topics as an active member in the malware and RCE scenes for last 6 years.
    Polymorphic code (self-modifying code) isn't the definition of polymorphism. In this case, the code base of the target obviously isn't polymorphic, but you can externally synthesize a single polymorphic rotation

    Quote Originally Posted by Jeremy S. Anderson
    There are only two things to come out of Berkley, Unix and LSD,
    and I don’t think this is a coincidence
    You can win the rat race,
    But you're still nothing but a fucking RAT.


    ++Latest Projects++
    [Open Source] Injection Library
    Simple PE Cipher
    FilthyHooker - Simple Hooking Class
    CLR Injector - Inject .NET dlls with ease
    Simple Injection - An in-depth look
    MPGH's .NET SDK
    eJect - Simple Injector
    Basic PE Explorer (BETA)

  8. #23
    Departure's Avatar
    Join Date
    Nov 2010
    Gender
    male
    Posts
    805
    Reputation
    125
    Thanks
    1,794
    My Mood
    Doh
    Quote Originally Posted by Jason View Post


    Polymorphic code (self-modifying code) isn't the definition of polymorphism. In this case, the code base of the target obviously isn't polymorphic, but you can externally synthesize a single polymorphic rotation
    I 100% agree Polymorphic and polymorphism are 2 different things..
    https://en.wikipedia.org/wiki/Polymorphic_code
    Polymorphism (computer science) - Wikipedia, the free encyclopedia

    Luckily we are all talking about Polymorphic as stated in the topic....

    Anyway at the end of the day he has done an excellent job, but it just simply is not Polymorphic..
    DJector.Lite
    Get the advantages of new injection technology, with 1 click easy to use injector, work for all platforms x86/x64

    Download

    D-Jector
    Get the most advanced and full featured injector around, works for any game and any platform x86/x64, nothing comes even close.
    Download

  9. #24
    Jason's Avatar
    Join Date
    Apr 2010
    Gender
    male
    Location
    /dev/null
    Posts
    5,704
    Reputation
    918
    Thanks
    7,676
    My Mood
    Mellow
    Quote Originally Posted by Departure View Post
    I 100% agree Polymorphic and polymorphism are 2 different things..
    https://en.wikipedia.org/wiki/Polymorphic_code
    Polymorphism (computer science) - Wikipedia, the free encyclopedia

    Luckily we are all talking about Polymorphic as stated in the topic....

    Anyway at the end of the day he has done an excellent job, but it just simply is not Polymorphic..
    Sigh, whatever.

    Quote Originally Posted by Jeremy S. Anderson
    There are only two things to come out of Berkley, Unix and LSD,
    and I don’t think this is a coincidence
    You can win the rat race,
    But you're still nothing but a fucking RAT.


    ++Latest Projects++
    [Open Source] Injection Library
    Simple PE Cipher
    FilthyHooker - Simple Hooking Class
    CLR Injector - Inject .NET dlls with ease
    Simple Injection - An in-depth look
    MPGH's .NET SDK
    eJect - Simple Injector
    Basic PE Explorer (BETA)

  10. #25
    Departure's Avatar
    Join Date
    Nov 2010
    Gender
    male
    Posts
    805
    Reputation
    125
    Thanks
    1,794
    My Mood
    Doh
    Quote Originally Posted by Jason View Post


    Sigh, whatever.
    No need to sigh... it is what it is..

    Once again great job and alot better than inserting random byte at the end of a code section and changing the integrity check(aka crc) in the PE headers...
    DJector.Lite
    Get the advantages of new injection technology, with 1 click easy to use injector, work for all platforms x86/x64

    Download

    D-Jector
    Get the most advanced and full featured injector around, works for any game and any platform x86/x64, nothing comes even close.
    Download

  11. #26
    .::SCHiM::.'s Avatar
    Join Date
    Sep 2010
    Gender
    male
    Posts
    733
    Reputation
    180
    Thanks
    880
    My Mood
    Twisted
    It's quite impossible to build a true polymorphic engine into the hack without having access to the original source code. Since hacks don't exactly abide by normal coding conventions, it's impossible to predict what I can and can't change about the code and the structure. And don't even mention the packers, 'encryption' and compression all the coders throw over their hacks before dumping them here. As you can see allot of people already have problems with that and there's simply nothing I can do about it, aside from spending a huge amount of time on making this crypter 100% transparent.

    I hear what you say about the hacks themselves not being polymorphic, and you're right there. What I meant was that the stub is different each time, but you got that already. I wonder though, how one would go go about building a mutating engine into a file that's static. As far as I know itt just can't be done. Either the mutation engine would be static or the hack would be static there's no middle ground.

    The method I use is really quite simple, it's very alike the one I posted on the site a few weeks ago and the source can be found in the previous version. It permutates the instructions used for decryption, swaps all registers and links with jumps.

    On another note, are you only interested in fighting malware? Or have you written some samples too?
    Last edited by .::SCHiM::.; 08-27-2012 at 06:26 AM.

    I'm SCHiM

    Morals derive from the instinct to survive. Moral behavior is survival behavior above the individual level.

    Polymorphic engine
    Interprocess callback class
    SIN
    Infinite-precision arithmetic
    Hooking dynamic linkage
    (sloppy)Kernel mode Disassembler!!!

    Semi debugger




  12. #27
    Departure's Avatar
    Join Date
    Nov 2010
    Gender
    male
    Posts
    805
    Reputation
    125
    Thanks
    1,794
    My Mood
    Doh
    I never really write malware(except maybe a small Remote Admin Tool for personal use), but I have coded "cryptors" before and other small tools for the malware scene, nothing too special but I am mainly in this scene for coding reasons only, There is lots to learn from the malware scene(well use to be lots to learn) but these days its about money instead of coding practices, which has put me off a little... My Other interest is the RCE scene, mainly for the coding side of it also but I have released a few keygens for known Reverse Teams, Keygening and Encryption is my favorite subjects, Done a couple of tutorials on larger Software companies and there registration of there products algorithm.

    Anyway sorry for the off topic, I did have a quick look through the source code you post last week(I think) and thought it was a good job, If I remember correctly Morphine source is freely available to get some mutation ideas from, But like you said... its probably not worth the effort considering most of these hacks have already been packed or protected by some other product, or they have been patched already. its only small few that it will be useful on. Good job keep it up...
    DJector.Lite
    Get the advantages of new injection technology, with 1 click easy to use injector, work for all platforms x86/x64

    Download

    D-Jector
    Get the most advanced and full featured injector around, works for any game and any platform x86/x64, nothing comes even close.
    Download

  13. #28
    .::SCHiM::.'s Avatar
    Join Date
    Sep 2010
    Gender
    male
    Posts
    733
    Reputation
    180
    Thanks
    880
    My Mood
    Twisted
    I like RCE too, I've been building an universal unpacker. It's far from finished, but I ahve a great idea. The code will run inside an emulator (almost finished) it will keep track of new memory allocated and each time execution jumps to a new region or 'dirty region' the image in memory is saved to disk and restarted in the emulator. Once the program enters a windows loop or message pump, you know the executable is full unpacked. I'll simply save and fix the last saved binary as the 'clean executable' the last jump location into this binary is the OEP.


    Ohh and there is loads of sources available on the internet, win32!evol, mistfal and lothan are all methamorphic and documented online. It isn't about the lack of ideas, it's just how to poperly implement them and the easiest way to go about it.
    Thoughts?
    Last edited by .::SCHiM::.; 08-28-2012 at 04:33 AM.

    I'm SCHiM

    Morals derive from the instinct to survive. Moral behavior is survival behavior above the individual level.

    Polymorphic engine
    Interprocess callback class
    SIN
    Infinite-precision arithmetic
    Hooking dynamic linkage
    (sloppy)Kernel mode Disassembler!!!

    Semi debugger




  14. #29
    topblast's Avatar
    Join Date
    Mar 2010
    Gender
    male
    Location
    Far from around you Programmer: C++ | VB | C# | JAVA
    Posts
    3,607
    Reputation
    149
    Thanks
    5,052
    My Mood
    Cool
    How in any way is that polymorphic?

    Isnt polymorphic the editing of code during runtime OR one class being able to call different functions like virtual functions , stuff like that.
    I just like programming, that is all.

    Current Stuff:

    • GPU Programmer (Cuda)
    • Client/Server (Cloud Server)
    • Mobile App Development

  15. #30
    bobmarleyvav's Avatar
    Join Date
    Sep 2012
    Gender
    male
    Posts
    21
    Reputation
    10
    Thanks
    1
    My Mood
    Amazed
    I editing in C++ ?

Page 2 of 3 FirstFirst 123 LastLast

Similar Threads

  1. [Release] [Source] Real polymorphic crypter
    By .::SCHiM::. in forum Combat Arms Spammers, Injectors and Multi Tools
    Replies: 18
    Last Post: 08-19-2012, 09:41 AM
  2. Windows Xp Source...*REAL*
    By [Banned]mark0108 in forum CrossFire Hack Coding / Programming / Source Code
    Replies: 10
    Last Post: 10-06-2010, 10:08 AM
  3. Real VB injecter Source code
    By Ugleh in forum Visual Basic Programming
    Replies: 34
    Last Post: 01-02-2010, 09:38 PM
  4. CS Source Clan/Server
    By Dave84311 in forum General
    Replies: 20
    Last Post: 10-04-2006, 12:21 PM
  5. Counter Strike: Source
    By Flawless in forum CounterStrike (CS) 1.6 Hacks / Counter Strike: Source (CSS) Hacks
    Replies: 15
    Last Post: 06-03-2006, 08:28 PM