Star Control Unprotect by Independent (IND)
2 of 2 files
mad vandal
- Browsers may flag this download as unwanted or malicious. If unsure, scan it with VirusTotal.
-
Last modified Aug 30, 1990 6:57:46 AM
MD5 checksum c56faa158df62de6ebbc35943fd13dc6
Mime type Zip archive data
Download starcon.zip
Size 1 kB
1990 August 30
- Text / NFO file or scene release
- Mad Vandal, writer credits
1 item in the archive
- STARCON.UNP
----------------------
Star Control unprotect
By the MAD VANDAL
----------------------
Another doc check, I've run out of things to say about it em, except
thats it getting real old. As usual it can be cracked by change one byte in
the file STARCON.OVL.
Norton users search the file STARCON.OVL for the byte pattern F9 F3 A6 74 and
change the 74 to EB at offset 1EC9.
DEBUG method. DEBUG is assumed to be in the current path or dir.
1. DEBUG STARCON.OVL
2. At the DEBUG '-' prompt enter E 1FC9 EB
3. Enter 'W' to save it.
4. Enter 'Q' to quit.
Ok, that will do it. Code changes are shown below:
BEFORE
XXXX:1FA9 8BB682FE MOV SI,[BP+FE82] <- Process user
XXXX:1FAD C682F6FE00 MOV BYTE PTR [BP+SI+FEF6],00 entry.
XXXX:1FB2 8DBE30FF LEA DI,[BP+FF30]
XXXX:1FB6 8DB6F6FE LEA SI,[BP+FEF6]
XXXX:1FBA 16 PUSH SS
XXXX:1FBB 07 POP ES
XXXX:1FBC B9FFFF MOV CX,FFFF
XXXX:1FBF 33C0 XOR AX,AX
XXXX:1FC1 F2 REPNZ
XXXX:1FC2 AE SCASB
XXXX:1FC3 F7D1 NOT CX
XXXX:1FC5 2BF9 SUB DI,CX
XXXX:1FC7 F3 REPZ
XXXX:1FC8 A6 CMPSB <- Compare entry to answer
XXXX:1FC9 7405 JZ 1FD0 <- jump if corrent
XXXX:1FCB 1BC0 SBB AX,AX <- Set flag to indicate wrong
XXXX:1FCD 1DFFFF SBB AX,FFFF < Answer
XXXX:1FD0 3D0100 CMP AX,0001 <- Continue on
XXXX:1FD3 1BC0 SBB AX,AX
XXXX:1FD5 F7D8 NEG AX
AFTER
XXXX:1FA9 8BB682FE MOV SI,[BP+FE82] <- Process user
XXXX:1FAD C682F6FE00 MOV BYTE PTR [BP+SI+FEF6],00 entry.
XXXX:1FB2 8DBE30FF LEA DI,[BP+FF30]
XXXX:1FB6 8DB6F6FE LEA SI,[BP+FEF6]
XXXX:1FBA 16 PUSH SS
XXXX:1FBB 07 POP ES
XXXX:1FBC B9FFFF MOV CX,FFFF
XXXX:1FBF 33C0 XOR AX,AX
XXXX:1FC1 F2 REPNZ
XXXX:1FC2 AE SCASB
XXXX:1FC3 F7D1 NOT CX
XXXX:1FC5 2BF9 SUB DI,CX
XXXX:1FC7 F3 REPZ
XXXX:1FC8 A6 CMPSB <- Compare entry to answer
XXXX:1FC9 EB05 JMP 1FD0 <- Always jumps, always right
XXXX:1FCB 1BC0 SBB AX,AX <- Set flag to indicate wrong
XXXX:1FCD 1DFFFF SBB AX,FFFF < Answer. This is always skipped.
XXXX:1FD0 3D0100 CMP AX,0001 <- Continue on
XXXX:1FD3 1BC0 SBB AX,AX
XXXX:1FD5 F7D8 NEG AX
As long as software companies waste their time on this, I will continue to
crack it.