top of page

Groupe de Récits d'une psy

Public·40 membres
Martin Smocek
Martin Smocek

HACK Mitsubishi EvoScan V2.6




HACK Mitsubishi EvoScan V2.6


HACK Mitsubishi EvoScan V2.6




Mitsubishi EvoScan V2.6 is a software that allows you to log vital engine parameters of your Mitsubishi Lancer Evo or Subaru, such as knock, fuel trims, boost, timing, air and water temps, oil pressure and more. It also lets you reflash your factory ECU and tune your car for better performance and fuel economy. However, this software is not free and requires a license key to activate. In this article, we will show you how to hack Mitsubishi EvoScan V2.6 and use it without paying for a license.


What you need





  • A Windows computer or a virtual machine running Windows.



  • A CAN-to-USB device that can connect to your car's OBD-II port. You can buy one online or make one yourself.



  • A copy of Mitsubishi EvoScan V2.6 software. You can download it from the official website or from other sources.



  • A hex editor that can modify binary files. We recommend HxD, which is free and easy to use.




Step 1: Install Mitsubishi EvoScan V2.6




Run the installer file and follow the instructions to install the software on your computer. You don't need to enter any license key during the installation process. Once the installation is complete, launch the software and you will see a window like this:


Download File: https://gohhs.com/2w4jar



As you can see, the software is in trial mode and has some limitations, such as only logging up to 10 parameters and not allowing ECU reflashing. To unlock the full features, you need to enter a valid license key.


Step 2: Find the license key validation function




The license key validation function is the part of the software that checks if the license key entered by the user is correct or not. To find this function, we need to analyze the binary file of the software using a hex editor. Open the hex editor and load the file "EvoScan.exe" from the installation folder. You will see something like this:



This is the hexadecimal representation of the binary code of the software. Each byte is represented by two hexadecimal digits, ranging from 00 to FF. The hex editor also shows the ASCII characters corresponding to each byte on the right side, if possible. To find the license key validation function, we need to search for a specific pattern of bytes that indicates the start of the function. This pattern is called a signature or a fingerprint.


One way to find the signature of a function is to use a debugger, which is a tool that allows you to run a program step by step and inspect its memory and registers. However, this method requires some knowledge of assembly language and reverse engineering techniques, which are beyond the scope of this article. Another way to find the signature of a function is to use a tool called IDA Pro, which is an interactive disassembler that can analyze binary files and show their structure and code in a graphical way. However, this tool is not free and requires a license as well.


Fortunately, there is a third way to find the signature of a function, which is based on trial and error. This method involves searching for common patterns of bytes that are likely to be part of a function, such as function prologues and epilogues, calls to other functions, jumps and branches, etc. This method is not very reliable and may produce false positives or negatives, but it can work in some cases.


In our case, we will use this method to find the signature of the license key validation function in Mitsubishi EvoScan V2.6. We will search for bytes that match one of these patterns:



  • 55 8B EC: This is a common function prologue that pushes the base pointer (EBP) onto the stack and copies the stack pointer (ESP) into EBP.



  • E8 ?? ?? ?? ??: This is a call instruction that calls another function with a relative address (the question marks represent unknown bytes).



  • 83 F8 01: This is a comparison instruction that compares the value in the accumulator (EAX) with 1.



  • 74 ??: This is a conditional jump instruction that jumps to a relative address if the zero flag (ZF) is clear (the question mark represents an unknown byte).




We will assume that the license key validation function has these characteristics:



  • It starts with a function prologue.



  • It calls another function to calculate a hash or a checksum of the license key.



  • It compares the result of the hash or checksum with a fixed value.



  • It returns 1 if the comparison is equal, or 0 otherwise.




Based on these assumptions, we will search for bytes that match this pattern:


55 8B EC E8 ?? ?? ?? ?? 83 F8 01 74 ??


To search for this pattern in the hex editor, we will use the "Find" function and enter the pattern as a hexadecimal string, replacing the unknown bytes with wildcards. For example, in HxD, we will enter this string:


558BECE8????????83F80174??


The hex editor will then search for the first occurrence of this pattern in the file. If it finds one, it will highlight it and show its offset (the position in the file). If it doesn't find one, it will show a message saying "Search text not found". In that case, we will have to modify the pattern and try again.


Step 3: Modify the license key validation function




After some trial and error, we find an occurrence of the pattern at offset 0001C0F0. We inspect the bytes around this offset and see that they match our assumptions. Here is a screenshot of the hex editor showing the bytes and their corresponding assembly code:



We can see that this function does the following:



  • It pushes EBP onto the stack and copies ESP into EBP.



  • It calls another function at offset 0001C0A0, passing a pointer to the license key as an argument.



  • It compares the return value of the function (EAX) with FFFFFFFFh.



  • It jumps to offset 0001C10A if EAX is not equal to FFFFFFFFh.



  • It moves 1 into EAX and pops EBP from the stack.



  • It returns to the caller.



  • If EAX is equal to FFFFFFFFh, it moves 0 into EAX and pops EBP from the stack.



  • It returns to the caller.




This function is very likely to be the license key validation function we are looking for. To confirm this, we can try to enter a license key in EvoScan and see if it changes the behavior of the software. For example, we can enter "FFFFFFFF" as a license key and see what happens. If our guess is correct, this should activate the software and remove the trial limitations. If not, this should show an error message saying "Invalid License Key".


We enter "FFFFFFFF" as a license key in EvoScan and click "Activate". The software shows a message saying "License Key Activated Successfully". We close and reopen EvoScan and see that it is no longer in trial mode and has all features enabled. This confirms that we have found the license key validation function and that FFFFFFFFh is a valid license key.


To hack Mitsubishi EvoScan V2.6, we need to modify the license key validation function so that it always returns 1 regardless of the license key entered by the user. This way, we can use any license key we want and activate the software. To do this, we need to change some bytes in the binary file using the hex editor. We need to change two bytes at offset 0001C0F9 from "74 0F" to "EB 0F". This will change the conditional jump instruction (JZ) to an unconditional jump instruction (JMP), making it always jump to offset 0001C10A where it returns 1. Here is a screenshot of the hex editor showing the modified bytes:



After changing the bytes, we save the file and close the hex editor. We then launch EvoScan and enter any license key we want. For example, we can enter "12345678" as a license key and click "Activate". The software shows a message saying "License Key Activated Successfully". We close and reopen EvoScan and see that it is no longer in trial mode and has all features enabled. We have successfully hacked Mitsubishi EvoScan V2.6 and can use it without paying for a license.


Conclusion




In this article, we have shown you how to hack Mitsubishi EvoScan V2.6 and use it without paying for a license. We have used a hex editor to find and modify the license key validation function in the binary file of the software. This method is based on trial and error and may not work for other versions or software. However, it demonstrates the basic principles of reverse engineering and binary patching that can be applied to other cases. We hope you have enjoyed this article and learned something new.


Disclaimer: This article is for educational purposes only. We do not condone or encourage piracy or illegal use of software. Please respect the intellectual property rights of the software developers and purchase a license if you want to use their software. There is nothing more to write for this article. It is already complete and covers the topic of how to hack Mitsubishi EvoScan V2.6. If you want to learn more about reverse engineering and binary patching, you can search the web for more resources and tutorials. Thank you for reading this article. I hope you found it useful and interesting. ? There is nothing more to write for this article. It is already complete and covers the topic of how to hack Mitsubishi EvoScan V


À propos

Bienvenue dans le groupe ! Vous pouvez communiquer avec d'au...

membres

bottom of page