Phantasm 2014!
Download the PDF and Binary Files.

0

Attachments

  • zip dd2
    File size: 2 MB Downloads: 363

Publication author

offline 2 weeks

mus@shi9

0
Comments: 1160Publics: 2780Registration: 06-03-2017

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
Sunny
Sunny
8 years ago

Hi, I thought I would just put a couple out there. Shinobi looks very similar(maybe identical) to this one. I cant seem to find out how it manages to disable AR3 though (Apparently very easily no doubt?) Also has an interesting anti piracy pic when copy loaded. Another one is Fire&Ice, disk 1 appears to have a copylock-type on track 0, and then tracks 65-80 seem to have some MFM encoding??? I think it uses the copylock for its encrypted bootblock?, but you can easily copy out decrypted bootblock at 59e8 after track 1 loads. This will enable the disk… Read more »

TheSpecialist
TheSpecialist
8 years ago

Wow I never figured Amiga protections where this tough ! I’ve been reading how some hackers did 3 cracks in day, that would be impossible with this one it seems to me. Very nice copper/blitter idea indeed. Who was the first one to crack this and anyone any idea how much time it took him ?

0
Phantasm
Reply to  TheSpecialist
8 years ago

I can’t believe its close to two years since I wrote this tutorial – maybe its time i started on a new one.

0
scenex
Reply to  Phantasm
8 years ago

Sounds like a great idea indeed 🙂

0
thespecialist
Reply to  Phantasm
8 years ago

Parasol stars is supposed to be relatively difficult.
I read that it took them a week to crack Double Dragon 2, which seems about right I think. It’s a relatively difficult protection but of course easy compared to modern protections like we have now (difficult now could mean weeks if not months of work while difficult on the Amiga meant days). BTW I’ve sent you a PM mate !

0
Phantasm
Reply to  thespecialist
8 years ago

i’ll take a look when i’ve got some time. I’m not sure that a tutorial around spending days bypassing various levels of encryption and hunting down checksums is going to be that interesting to write (or read for that matter). I tend to favor the MFM stuff as I find that more fun to work with.

0
Richard Aplin
Richard Aplin
9 years ago

Super entertaining! Thanks! I’d forgotten most of the protection stuff I put in there but I do remember taking some time and having some fun with it. Yeah hiding decryption keys for each file somewhere would’ve been a good one, but only so many hours in the day… As you can imagine, making all that protection code actually work in the first place was quite time-consuming. I think it took a week or two to do.
Thanks so much, a great blast from my past 🙂
Rich

0
phantasm
phantasm
Reply to  Richard Aplin
9 years ago

glad you enjoyed reading it. its pretty amazing that there are still people out there that are interested in reading this stuff (and writing it too). It was fun writing this too and it took me back to the old days 🙂

0
plagueis
9 years ago

Excellent! Thanks Phantasm, this was highly educational. I’ll be saving this to keep among my references.

0
dlfrsilver
dlfrsilver
9 years ago

Wow, congratulations Phantasm for doing such a great tutorial like this. Incredible all the protections encountered so far, and the mess it is to remove/patch them all !!!

0
aLpHa oNe
9 years ago

I am really impressed how heavy things can be protected. Thanks for the tutorial although it’s hard for me to follow. 🙂 Great work and respect for your skills.

0
scenex
scenex
9 years ago

Thanks a lot for providing a tutorial on a title, which is considered, to my knowledge, as one of the best protected Amiga games ever written!

0
WayneK
9 years ago

Fantastic work Phantasm, I know how much effort must go into producing a tutorial like this!
As you said, I’m surprised there were no “modified memory” checks when you consider how much work was put into encrypting/hiding loaders etc…
I remember Stingray teaching me about the copperlist blitter-decrypt stuff many years ago – very clever method! Can you think of any other games that do similar?

0
Phantasm
Reply to  WayneK
9 years ago

given that the data is mixed in with the code and not separated out i guess any checksums would have to be quite targeted (otherwise data/variables that might change would end up affecting the checksum results). Also the checksums would have to be careful to only be executed when the encrypted/decrypted areas of memory were in a known configuration. As for the copperlist/blitter decrypt stuff I haven’t seen that in action before although I was aware of the idea. This one did have some neat ideas and was a fun project. It could have been made much more painful if… Read more »

Wack0
9 years ago

I guess I’m going to have to leave the message here that Richard Aplin left in Final Fight, since it refers to the protection of this game somewhat!

http://tcrf.net/Final_Fight_(Amiga)

0
Bilbs
Reply to  Wack0
9 years ago

I’ve never seen that before – it’s bonkers 🙂

0
Authorization
*
*

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Registration
*
*
*

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Password generation

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

0
Would love your thoughts, please comment.x
()
x