Jump to content
Sign in to follow this  
registered_fugitive

"cracking" encrypted pbos?

Recommended Posts

Before there was a guy who cracked one of Kabal's pbo's...dont remember who it was, but anyway, does anyone here know how to do that??

We, P Machine and myself the authors of the NZDF Pack, need to get inside the NZDF_inf.pbo to update it cause when P Machine lost his HD he lost all the files that were inside that PBO and now we only have the .pbo like anyone who has downloaded it... I never had all the files so this seems to be the best way to do it.  It was locked using the same method as INQ and Kabal does when locking theres, placing a file inside the PBO. Now that this has happened we really regret locking it.

so, can anyone help us out as to how this is done?

Cheers.

Share this post


Link to post
Share on other sites

ah OK, i didn't get you right then...

Can't help, sorry...

Share this post


Link to post
Share on other sites

Hi,

This is the method that worked for me on the NZDF pack when I wanted to take a closer look at the webbing details:

1) Copied the original PBO file in order not to mess up the original

2) Removed first 46 bytes from the PBO file using a hexadecimal editor

The string to be removed is:

.sreV................product.OFP: Resistance..

3) Saved this adapted PBO

4) Extracted the newly saved PBO using pbodecryptor 1.3

Hope this helps.

Regards,

Sander

Share this post


Link to post
Share on other sites
Hi,

This is the method that worked for me on the NZDF pack when I wanted to take a closer look at the webbing details:

1) Copied the original PBO file in order not to mess up the original

2) Removed first 46 bytes from the PBO file using a hexadecimal editor

The string to be removed is:

.sreV................product.OFP: Resistance..

3) Saved this adapted PBO

4) Extracted the newly saved PBO using pbodecryptor 1.3

Hope this helps.

Regards,

Sander

And from who did you steal that?

And a better thing Use: the OFP Byte remover from CIA.

And this lame security is so easy to crack.

Im glad no one can crack mine.

Share this post


Link to post
Share on other sites
Quote[/b] ]Im glad no one can crack mine.

It's not that yours couldnt be cracked. It's just that someone has to "want" to first. wink_o.gif

Share this post


Link to post
Share on other sites
Quote[/b] ]Im glad no one can crack mine.

It's not that yours couldnt be cracked. It's just that someone has to "want" to first.  wink_o.gif

CT:

I dont know cause i based my security on the one that VBS1 has ( USB key ) but then built in to one file.

So if you can crack that you can crack the VBS1 files also then.

Share this post


Link to post
Share on other sites

Ah, so now you're distributing USB keys. *grumbles profanities*

Not that I'd really want to try to crack your stuff, but you're just going a bit overboard.

Share this post


Link to post
Share on other sites
Ah, so now you're distributing USB keys. *grumbles profanities*

Not that I'd really want to try to crack your stuff, but you're just going a bit overboard.

MSPENCER please stfu you whore.

Man your anoying me all the times.

And im not dusturbing USB keys.

I said my security is based on that.

And dont try to anoy me again man....

Share this post


Link to post
Share on other sites

waffendennis, thats a three day holiday for you, plus 3 warning boxes.

Share this post


Link to post
Share on other sites
Guest
This topic is now closed to further replies.
Sign in to follow this  

×