| |
Urban Space Cowboy
Registered: Nov 2004 Posts: 45 |
Release id #86146 : Color7 Prod.95
"booturbos .sda" contains the archive "source code .sda" which is password protected (by Protector V1.7 according to unp64). Any enterprising hackers want to try to crack the protection? :) |
|
| |
tlr
Registered: Sep 2003 Posts: 1790 |
IIRC that protector is pretty evil, relying on badline timing during changing $d011 and things like that.
Cracking it will certainly be a challenge. I'm guessing brute force, running in emulation (e.g x64sc) is the only workable way.
Trying to ask for the password or guessing it based on clues may be easier though. Maybe the polish word for "tissemand"? ;) |
| |
Zyron
Registered: Jan 2002 Posts: 2381 |
Who coded that protector btw? |
| |
tlr
Registered: Sep 2003 Posts: 1790 |
Dino perhaps?
Looking at it now it seems it doesn't use badlines, only (all 4) timers.
.C:0ed2 B1 FC LDA ($FC),Y
.C:0ed4 C6 01 DEC $01
.C:0ed6 4D 04 DC EOR $DC04
.C:0ed9 4D 05 DD EOR $DD05
.C:0edc 4D 06 DC EOR $DC06
.C:0edf 4D 07 DD EOR $DD07
.C:0ee2 4D 07 DC EOR $DC07
.C:0ee5 4D 06 DD EOR $DD06
.C:0ee8 4D 05 DC EOR $DC05
.C:0eeb 4D 04 DD EOR $DD04
.C:0eee E6 01 INC $01
.C:0ef0 91 FC STA ($FC),Y
.C:0ef2 C6 01 DEC $01
.C:0ef4 8D 20 D0 STA $D020
.C:0ef7 E6 01 INC $01
.C:0ef9 E6 FC INC $FC
.C:0efb D0 02 BNE $0EFF
.C:0efd E6 FD INC $FD
.C:0eff A5 FC LDA $FC
.C:0f01 C5 2D CMP $2D
.C:0f03 D0 CD BNE $0ED2
.C:0f05 A5 FD LDA $FD
.C:0f07 C5 2E CMP $2E
.C:0f09 D0 C7 BNE $0ED2 Initial values in the timer registers is the key.
Assuming you have enough stamina to make a reliable model of what each timer contains each lap it might be feasible to use some statistical approach on this.
You know that $dc04,$dc06,$dd04,$dd06 will decrease by the same amount each lap (not exactly because of the timer wrap, but mostly) $dc05,$dc07,$dd05,$dd07 will change sort of seldom.
|
| |
wacek
Registered: Nov 2007 Posts: 513 |
Got in touch with Color 7 guys, maybe they will be able to help ;) |
| |
Cresh
Registered: Jan 2004 Posts: 354 |
I bet it contains something that is already in here.
But good luck! :) |