131 lines
5.1 KiB
Plaintext
131 lines
5.1 KiB
Plaintext
![]() |
FRMWRK2.UNP Breaking Framework II's Softguard 2.03 Protection
|
|||
|
by The Lone Victor
|
|||
|
|
|||
|
Adapted to Framework II by
|
|||
|
George V. Hartmann / David Jelen
|
|||
|
|
|||
|
United States copyright law SPECIFICALLY grants you the right to
|
|||
|
make copies of programs you buy on magnetic media. Programs are copy
|
|||
|
protected IN VIOLATION OF YOUR RIGHTS UNDER U.S. LAW.
|
|||
|
|
|||
|
Programs that are protected by the Softguard system are distinguished
|
|||
|
by the files CML0203.HCL and VDF0203.VDW which are hidden in the root
|
|||
|
directory when you install the program on your fixed disk. The 0203
|
|||
|
part of the file names is the Softguard version (2.03) while CML stands
|
|||
|
for Common Loader and VDF is the Volume Descriptor File. The extensions
|
|||
|
HCL and VDW stand for Hard-disk Common Loader and Verify Descriptor Working
|
|||
|
copy. In addition, there will be a hidden root file with a .EXE or .LOD
|
|||
|
or some other extension. This is the REAL program, which has been
|
|||
|
encrypted and hidden.
|
|||
|
|
|||
|
The program FW.COM, in the product directory is the Softguard
|
|||
|
miniloader. All it does is call the Common Loader. For example, when you
|
|||
|
run FW, the program FW.COM loads CML0203.HCL high in memory and
|
|||
|
runs it. CML decrypts itself and reads VDF0203.VDW. The VDF file contains
|
|||
|
some code and data from the fixed disk FAT at the time of installation. By
|
|||
|
comparing the information in the VDF file with the current FAT, CML can
|
|||
|
tell if the CML, VDF, and FW.A26 files are in the same place on the disk
|
|||
|
where they were installed. If they have moved, say from a backup &
|
|||
|
restore,then CLIPPER will not run.
|
|||
|
|
|||
|
This text file is designed to let you unprotect the most current
|
|||
|
version of Framework, Framework II, which is protected by a variation of
|
|||
|
Softguard 2.03. (not 2.03A)
|
|||
|
|
|||
|
-- INSTRUCTIONS --
|
|||
|
|
|||
|
First, using your valid, original FRAMEWORK diskette, install it on a
|
|||
|
fixed disk. You cannot use this text to unprotect the floppy directly!
|
|||
|
Softguard hides three files in your fixed disk root directory: CML0203.HCL,
|
|||
|
VDF0203.VDW, and FW.A26. It also copies FW.COM into your chosen
|
|||
|
FRAMEWORK directory. FW.A26 is the real FRAMEWORK program, encrypted. The
|
|||
|
extension of this file does not matter. It is really an encrypted .EXE
|
|||
|
file.
|
|||
|
|
|||
|
Second, un-hide the three files in the root directory. You can do
|
|||
|
this with the programs ALTER.COM or FM.COM found on any BBS.
|
|||
|
|
|||
|
Make copies of the three files, and of FW.COM, into some other
|
|||
|
directory.
|
|||
|
|
|||
|
Hide the three root files again using ALTER or FM.
|
|||
|
|
|||
|
Following the FRAMEWORK instructions, UNINSTALL FRAMEWORK. You can
|
|||
|
now put away your original FRAMEWORK diskette. We are done with it.
|
|||
|
|
|||
|
Now copy your four saved files back into the root directory and hide
|
|||
|
the CML0203.HCL, VDF0203.VDW, and FW.A26 files using ALTER or FM.
|
|||
|
|
|||
|
We can now run FW.COM using DEBUG, trace just up to the point where it
|
|||
|
has decrypted FW.EXE, then write that file out.
|
|||
|
|
|||
|
LET 'ER RIP!
|
|||
|
|
|||
|
Instructions Comments
|
|||
|
|
|||
|
|
|||
|
debug CLIPPER.com ; name of file that runs the product
|
|||
|
r <CR> ; dump debug's registers
|
|||
|
|
|||
|
**** WRITE DOWN THE VALUE OF DS FOR USE BELOW. ****
|
|||
|
**** THIS VALUE IS DEPENDENT ON YOUR PARTICULAR MACHINE. ****
|
|||
|
|
|||
|
g 4D7 ; now we can trace CML
|
|||
|
t
|
|||
|
g 1B5
|
|||
|
t
|
|||
|
e cs:A2
|
|||
|
74.EB ; debug reports the 74 here, you enter EB
|
|||
|
e cs:127 ;
|
|||
|
E8.90 ; you enter the 90's followed by a space, and
|
|||
|
D1.90 05.90 <CR> ; a carriage retirn after the 3rd 90 (no space).
|
|||
|
g 127
|
|||
|
a 185
|
|||
|
jmp 1C5
|
|||
|
<CR> ; this second CR gets you out of the assembler
|
|||
|
a 22B
|
|||
|
jmp 265
|
|||
|
<CR>
|
|||
|
a 41F
|
|||
|
mov ax,22
|
|||
|
<CR>
|
|||
|
e cs:42F
|
|||
|
01.89 ; debug reports the 01, you enter 89
|
|||
|
a 4CE
|
|||
|
mov bl,7A
|
|||
|
<CR>
|
|||
|
g 4DF
|
|||
|
g 281
|
|||
|
t
|
|||
|
g 24D
|
|||
|
t
|
|||
|
g 5A6 ; wait while reading VDF & FAT
|
|||
|
g=5B1 5C1
|
|||
|
g=5C9 9DA ; FW.EXE has been decrypted
|
|||
|
|
|||
|
d cs:1E7 L8 ; just for grins, here's the password
|
|||
|
|
|||
|
rBX <CR>
|
|||
|
:3 ; set BX to 3
|
|||
|
rCX <CR>
|
|||
|
:7600 ; set CX to 7600
|
|||
|
|
|||
|
n fw.bin ; name of file to write to
|
|||
|
w XXXX:100 ; where XXXX is the value of DS that
|
|||
|
; you wrote down at the beginning.
|
|||
|
q ; quit debug
|
|||
|
|
|||
|
REN FW.BIN FW.EXE
|
|||
|
|
|||
|
Now unhide and delete the files FW.A26, VDF0203.VDW and CML0203.HCL.
|
|||
|
FW.COM should also be deleted from the root directory and the product
|
|||
|
directory. Copy FW.EXE from the root directory to the product directory
|
|||
|
and you are done. (And so is Ashton-Tate)
|
|||
|
|
|||
|
NOTE: The Lone Victor is the author of this method to unprotect
|
|||
|
Softguard protected products, and deserves all the credit. I adapted his
|
|||
|
method to Framework II and "cleaned-up" a "chain-letter" unprotection file
|
|||
|
that some novices would have had trouble fathoming. Robert White and Steve
|
|||
|
Diamond had nothing to do with this. GVH
|
|||
|
|