Brutkey

Foone🏳️‍⚧️🏳️‍⚧️
@foone@digipres.club
Foone🏳️‍⚧️🏳️‍⚧️
@foone@digipres.club

I patched the EXE to have the right value, but then they checksum it, and now the value is wrong!

Foone🏳️‍⚧️🏳️‍⚧️
@foone@digipres.club

THEY CHECKSUM THE FIRST 16KB OF EXECUTABLE RAM?

Foone🏳️‍⚧️🏳️‍⚧️
@foone@digipres.club

I need a comparative DOS CPU tracer.

Like, load two copies of the same EXE, and run until the execution diverges

Foone🏳️‍⚧️🏳️‍⚧️
@foone@digipres.club

I think they might be depending on the value of the weird sector elsewhere. like they're loading it SOMEWHERE, maybe they overwrite some code?

Foone🏳️‍⚧️🏳️‍⚧️
@foone@digipres.club

and... it doesn't work.
tertiary copy protection?

Foone🏳️‍⚧️🏳️‍⚧️
@foone@digipres.club

I have 37 bytes. this won't be hard

Foone🏳️‍⚧️🏳️‍⚧️
@foone@digipres.club

normal people don't do this. normal people don't write 16bit DOS assembly in 2025.

Foone🏳️‍⚧️🏳️‍⚧️
@foone@digipres.club

okay I now know HOW to crack the game, I just gotta write the x86 assembly.

Foone🏳️‍⚧️🏳️‍⚧️
@foone@digipres.club

oh god they overwrite the DOS interrupt 1E in the middle, to make DOS think it's a different kind of floppy disk.

Foone🏳️‍⚧️🏳️‍⚧️
@foone@digipres.club

so you can't just overwrite check_copyprotection_sector with return 0