req: AppSpider 7.2.139 (newest 2021 june 14)
by zeneq - June 14, 2021 at 11:19 PM
#1
There is brand new AppSpider on their site 7.2.139 (newer than newest 7.4.x they release) which fixes the chromium bug.  When you download the software, it gives a 7.4.x version exe :(  This is not the newest!  If anyone else managed to get the correct 7.2.139 version could you please share it, thank you!

note: I'm interested in 7.2.139 both because it is the newest version released June 9, as WELL as that my theory is that the 7.2.x branch is 32 bit and thus can be cracked by existing patcher.  I set up 32 bit windows vm just to try to get it to update to 32 bit version and it didn't work for me.  Anyone got this?
Reply
#2
1. Install last AppSpider to PC.
2. Send you ID to my PM
3. Wait activation key...
Reply
#3
any one take me link download
Reply
#4
@Kiraelo
thank you I sent you PM with my ID

@shaxawan9
http://download2.rapid7.com/download/App...lSetup.exe
or, if you already have it and want to update, link is http://download2.rapid7.com/download/App...rSetup.exe
(but as I said in my post, this is not the newest version right now, oddly)
Reply
#5
(June 15, 2021 at 11:35 PM)zeneq Wrote: @Kiraelo
thank you I sent you PM with my ID

@shaxawan9
http://download2.rapid7.com/download/App...lSetup.exe
or, if you already have it and want to update, link is http://download2.rapid7.com/download/App...rSetup.exe
(but as I said in my post, this is not the newest version right now, oddly)

I made a key for you. Check PM.
Reply
#6
@Kiraelo major thanks! you rock!  This totally worked.  Since I made this thread I may as well share my crack progress in case anyone else here knows x64 assembly well enough to help me.  I am very close to an actual crack but just haven't been able to get it.

The original x64bit assembly routine that I need to fix:

00007FF7EA635330 | 48:83EC 48              | sub rsp,48                              |
00007FF7EA635334 | 4C:8BD1                  | mov r10,rcx                            |
00007FF7EA635337 | 44:8BC2                  | mov r8d,edx                            |
00007FF7EA63533A | 41:81C8 94990000        | or r8d,9994                            |
00007FF7EA635341 | 44:8BCA                  | mov r9d,edx                            |
00007FF7EA635344 | 41:83E1 01              | and r9d,1                              |
00007FF7EA635348 | 44:0F44C2                | cmove r8d,edx                          |
00007FF7EA63534C | 41:8BC8                  | mov ecx,r8d                            |
00007FF7EA63534F | 41:8BC0                  | mov eax,r8d                            |
00007FF7EA635352 | 81C9 80D10000            | or ecx,D180                            |
00007FF7EA635358 | 24 02                    | and al,2                                |
00007FF7EA63535A | 41:0F44C8                | cmove ecx,r8d                          |
00007FF7EA63535E | 41:890A                  | mov dword ptr ds:[r10],ecx              |
00007FF7EA635361 | 45:85C9                  | test r9d,r9d                            |
00007FF7EA635364 | 74 05                    | je scanengine.7FF7EA63536B              |
00007FF7EA635366 | F6C1 01                  | test cl,1                              |
00007FF7EA635369 | 74 12                    | je scanengine.7FF7EA63537D              |
00007FF7EA63536B | F6C2 02                  | test dl,2                              |
00007FF7EA63536E | 74 05                    | je scanengine.7FF7EA635375              |
00007FF7EA635370 | F6C1 02                  | test cl,2                              |
00007FF7EA635373 | 74 24                    | je scanengine.7FF7EA635399              |
00007FF7EA635375 | 49:8BC2                  | mov rax,r10                            |
00007FF7EA635378 | 48:83C4 48              | add rsp,48                              |
00007FF7EA63537C | C3                      | ret                                    |
00007FF7EA63537D | 48:8D4C24 20            | lea rcx,qword ptr ss:[rsp+20]          |
00007FF7EA635382 | E8 D9071000              | call <scanengine.sub_7FF7EA735B60>      |
00007FF7EA635387 | 48:8D15 B25CC800        | lea rdx,qword ptr ds:[7FF7EB2BB040]    |
00007FF7EA63538E | 48:8D4C24 20            | lea rcx,qword ptr ss:[rsp+20]          |
00007FF7EA635393 | E8 FB320E00              | call <JMP.&_CxxThrowException>          |
00007FF7EA635398 | CC                      | int3                                    |
00007FF7EA635399 | 48:8D4C24 20            | lea rcx,qword ptr ss:[rsp+20]          |
00007FF7EA63539E | E8 BD071000              | call <scanengine.sub_7FF7EA735B60>      |
00007FF7EA6353A3 | 48:8D15 965CC800        | lea rdx,qword ptr ds:[7FF7EB2BB040]    |
00007FF7EA6353AA | 48:8D4C24 20            | lea rcx,qword ptr ss:[rsp+20]          |
00007FF7EA6353AF | E8 DF320E00              | call <JMP.&_CxxThrowException>          |

The way to fix this is to, as far as I understand it, to ensure that when the value gets stuffed back in memory here "mov dword ptr ds:[r10],ecx" that it is x780, not whatever other values it would have been normally.  This is what the original crack does.  However my every attempt to fix this has failed.  Does anyone else either have a working crack for appspider latest, or could you give pointers on the x64 assembly in the above to accomplish what I want?

BTW nopping out the conditional jumps leaves the program working, but demo.  Forcing the value 780 into the memory position by, for example, a "move ecx,x780" in front of that other instruction doesn't help.  Also just manually pushing that value and doing our own "ret" fails.  I'm pretty stumped I tried a lot of variations.

Any feedback public or private is appreciated.  And, thanks again @Kiraelo for the key!!  If anyone wants to share this keygen that could be useful too Wink  Thanks!

quick edit: the reason I am still looking for a crack or keygen is that I was able to use Kiraelo's key to register the appspider in this one test VM, but when I want to install to another VM or say an amazon instance or something, the fix is not portable even if I copy over all the changed files and registry keys. It's the sheriff acudata system.. seems to catch some minor difference and so I can't just clone even to another VM that is sibling clone from same template running on same hardware! kinda nuts.
Reply
#7
Nevermind I solved this. However, I still request the latest build if someone can get the newer one the they list but some reason it's not the one you download from their site... Thanks!
Reply
#8
After much testing I can say there are so many false positives it is useless. It is also shitty compared to Netsparker in that it finds a LOT less bugs (actual bugs too). I do not recommend AppSpider. It is fast, that's nice, but it doesn't do the right work so what good is that?
Reply
#9
(June 16, 2021 at 08:55 PM)Kiraelo Wrote:
(June 15, 2021 at 11:35 PM)zeneq Wrote: @Kiraelo
thank you I sent you PM with my ID

@shaxawan9
http://download2.rapid7.com/download/App...lSetup.exe
or, if you already have it and want to update, link is http://download2.rapid7.com/download/App...rSetup.exe
(but as I said in my post, this is not the newest version right now, oddly)

I made a key for you. Check PM.
Hi Kiraelo

Can you share me a key AppSpider 7.4 ?
This is my reference code 2925-5777-0500-0086-5420-7587
Reply
#10
Name: belove
Reference code: 2925-5777-0500-0086-5420-7587
Key: 1259-1210-2734-9802-3794-6464-5915-6587-6433-7392
Expire: 06/09/2022
Edition: Enterprise*

*Ent = 50 simultaneous scans (threads)
Reply
#11
Thank so much, you are my hero
Reply
#12
Hi Kiraelo

Can you share me a key AppSpider 7.4
This is my reference code: 3045-6203-8100-0086-8736-6428
Reply

Possibly Related Threads…
Thread Author Replies Views Last Post
AppSpider Keys for all Kiraelo 21 2,025 November 27, 2021 at 01:26 AM
Last Post: Novera
AppSpider Version 7.2.130.1 Cracked uCare 57 7,156 November 08, 2021 at 07:37 PM
Last Post: xsme
AppSpider Version 7.2.123.1 Cracked uCare 27 2,920 November 07, 2021 at 10:12 PM
Last Post: kraken0110

 Users browsing this thread: 1 Guest(s)