Unity FurryVNE [2024-11-09] [FurryVNE Team]

3.90 star(s) 9 Votes

npomme

Member
Nov 20, 2020
410
621
Its over...
No i can't with my skillset try more thing i need an account to gather data we just need to find someone that want to take the risk or wait until i find a way to pledge the dev even if i don't want to

and also i'm so frustrated that this became personnal if it's crackable i will crack this game !
 
  • Wow
Reactions: aknomas

Monoworks

Newbie
May 4, 2021
37
269
FurryVNE 2024-02-11





i need someone to check something for me what is the size of your game folder after login in with a pledged account?

i found the game load the skeleton and some assets from the cloud this can be the nail in the coffin if the game doesnt store them locally we are F***ed because without a valid login the game can't dowload the missing files!
I can confirm that the installation directory did not change in size after logging in!
 

Wacre

Member
Jun 2, 2017
223
206
Going so open about all this process wouldnt make the devs more aware and tricky about how to encrypt it? Im sure they are aware of the existence of this thread
 
  • Like
Reactions: Anita Deek

Placebo00

Member
Jan 3, 2019
282
249
Going so open about all this process wouldnt make the devs more aware and tricky about how to encrypt it? Im sure they are aware of the existence of this thread
Oh, it will. And its not like were deep in some form of unknown, dark-web forum. If the devs arent aware of f95's existence, someone under their belt would be.

Buuuut its the best we got atm, lets just see how things go from here.
 
  • Like
Reactions: aknomas

npomme

Member
Nov 20, 2020
410
621
Oh, it will. And its not like were deep in some form of unknown, dark-web forum. If the devs arent aware of f95's existence, someone under their belt would be.

Buuuut its the best we got atm, lets just see how things go from here.
Yeah but they can see what we Do and how we patch the game using exactly the same method we use in like 12 minutes they can compare the patched gameassembly see the byte that we modified decompile the thing see how we Do IT and change the code thats the game and talking about our process and what wee see Will change nothing
 

tester72

Member
Nov 8, 2019
301
324
when you try to load a character creator scene through explorer unity gives errors about no file in a folder that doesn't exist -> StreamingAssets\CC so its probably either crypted and packed or in the cloud
Would the last option also mean that if at any point this team ceases to exist for whatever reason then the whole "game" would die like all these online only games without servers?
 

Kernels

Newbie
Oct 11, 2021
34
57
Would the last option also mean that if at any point this team ceases to exist for whatever reason then the whole "game" would die like all these online only games without servers?
As someone said earlier, indeed their first game when it was in beta had similar protection only without the obfuscator. I don't think it's difficult for them to maintain these servers since their first game is still with working servers after 8 years. Most likely they will actually make this "game" free too when it comes out of beta.
To be honest, I'm only interested in this game because of these kinda innovative interactions. Well im probably asking too much but it’s a pity that it’s not open source and on il2cpp
 
Last edited:
  • Like
Reactions: captainlurker

Wacre

Member
Jun 2, 2017
223
206
As someone said earlier, indeed their first game when it was in beta had similar protection only without the obfuscator. I don't think it's difficult for them to maintain these servers since their first game is still with working servers after 8 years. Most likely they will actually make this "game" free too when it comes out of beta.
To be honest, I'm only interested in this game because of these kinda innovative interactions. Well im probably asking too much but it’s a pity that it’s not open source and on il2cpp
Same,this looks far superior to what can be done on trash like Honey Select or Koikatsu studio
Just...with furries,tho i dont mind that,pr0nz is pr0nz
 

haste

Newbie
Jul 27, 2018
30
26
Didn't the game launch for you and some other dude before? With the model and such?
Yes and no. You can force any unity scene to load either by making a custom hack or via UnityExplorer but all of the actual content of the program (namely meshes and such) isn't loaded, thus, all you get is a map, useless menus and background music. The current consensus of how this protection works is that the authorization function that npomme analyzed, somehow loads the needed content after authenticating patreon user.
Inside the dump.rar are dummy dll and the file that are needed to get the function name in ida because i don't know for sure that we all have the same result in the function naming
Il2CppDumper gave me the function names that you mentioned so I think we can assume that the results of header dumping are consistent.
Also, may I ask you whether you use IDA pro or the free version of IDA?

For the past 3 days I've been trying to learn reverse engineering with Ghidra but this program has been EXTREMELY uncooperative when it comes to debugging features. It cannot attach the debugger to a process that is already running without vomiting java exceptions and starting FurryVNE with a debugger attached at launch makes it crash with the "Failed to load original DLL" just like it sometimes does when you open it normally.
If I have to use an external debugger alongside Ghidra and look up decompiled functions by hand, then I'd rather give up Ghidra and try out IDA since I really want to be able to do proper decompilation debugging like you seem to be doing.

I'm trying to get my setup in working order by testing it on notepad.exe first, but at this point my patience has worn really thin. I already encountered multitude of problems I later found on Ghidra's github forums, many of which seem still unresolved... :FacePalm:
Going so open about all this process wouldnt make the devs more aware and tricky about how to encrypt it? Im sure they are aware of the existence of this thread
That is a valid concern but I don't think it matters, especially at this point because:
1. Fiddling with their protection will always cost time, and at this point it'll probably be a lot of work for very diminished returns.
2. The guys here (or 1 guy mostly, thank you again for your effort npomme) haven't done nowhere near that much progress to justify making all this talk more private, imo.
However if someone here cracked it, then maybe it would be smart to not disclose the most technical details publicly.
 
Last edited:

40C72

Member
Nov 8, 2021
141
451
Also, may I ask you whether you use IDA pro or the free version of IDA?
Free is ass. Either use a paid version with a HexRays Decompiler license or use Ghidra

For the past 3 days I've been trying to learn reverse engineering with Ghidra but this program has been EXTREMELY uncooperative when it comes to debugging features. It cannot attach the debugger to a process that is already running without vomiting java exceptions and starting FurryVNE with a debugger attached at launch makes it crash with the "Failed to load original DLL" just like it sometimes does when you open it normally.
If I have to use an external debugger alongside Ghidra and look up decompiled functions by hand, then I'd rather give up Ghidra and try out IDA since I really want to be able to do proper decompilation debugging like you seem to be doing.
Both Ghidra and IDA are designed as static disassembly tools first and foremost. I thoroughly recommend getting a dedicated debugger (x64dbg), the experience is significantly better. You do not have to look up disassembled/named functions by hand: you can either make or use a pre-existing script to export IDA databases to x64dbg databases

Anyway, I found some more time to look at it. Content is encrypted on-disk and gets decrypted through a field from the Patreon request. Essentially, you can't just patch the program to say blindly say "oh okay this unregistered user does have access," you'll need to figure out the encryption scheme and incorporate a keygen. Alternatively, a paid user could theoretically just dump the encrypted files from memory and then the crack would be distributed with those now-decrypted files
 
  • Heart
  • Like
Reactions: npomme and haste

haste

Newbie
Jul 27, 2018
30
26
You do not have to look up disassembled/named functions by hand: you can either make or use a pre-existing script to export IDA databases to x64dbg databases
THANK YOU.
Being able to load decompiled data into x64dbg is exactly what I needed so this is excellent news. Now I'll be able to actually start learning SRE somewhat properly instead of wasting time on bullshit java errors.

Funny thing is, I was already thinking about trying x64dbg for the dynamic part of analysis because I didn't llike WinDbg that much. Most tutorials I've seen used Ghidra alongside x64dbg anyway. Now I know why :LUL:
 

npomme

Member
Nov 20, 2020
410
621
Yes and no. You can force any unity scene to load either by making a custom hack or via UnityExplorer but all of the actual content of the program (namely meshes and such) isn't loaded, thus, all you get is a map, useless menus and background music. The current consensus of how this protection works is that the authorization function that npomme analyzed, somehow loads the needed content after authenticating patreon user.

Il2CppDumper gave me the function names that you mentioned so I think we can assume that the results of header dumping are consistent.
Also, may I ask you whether you use IDA pro or the free version of IDA?

For the past 3 days I've been trying to learn reverse engineering with Ghidra but this program has been EXTREMELY uncooperative when it comes to debugging features. It cannot attach the debugger to a process that is already running without vomiting java exceptions and starting FurryVNE with a debugger attached at launch makes it crash with the "Failed to load original DLL" just like it sometimes does when you open it normally.
If I have to use an external debugger alongside Ghidra and look up decompiled functions by hand, then I'd rather give up Ghidra and try out IDA since I really want to be able to do proper decompilation debugging like you seem to be doing.

I'm trying to get my setup in working order by testing it on notepad.exe first, but at this point my patience has worn really thin. I already encountered multitude of problems I later found on Ghidra's github forums, many of which seem still unresolved... :FacePalm:

That is a valid concern but I don't think it matters, especially at this point because:
1. Fiddling with their protection will always cost time, and at this point it'll probably be a lot of work for very diminished returns.
2. The guys here (or 1 guy mostly, thank you again for your effort npomme) haven't done nowhere near that much progress to justify making all this talk more private, imo.
However if someone here cracked it, then maybe it would be smart to not disclose the most technical details publicly.
I'm using ida pro and debuger work but you need to consider that :

1707947275799.png

so you will need to patch the assembly via hex editor or create fuction inside the empty space that do the patching inside the code and find a way to call it somewhere

Dont use IDA free it pure garbage and if its true it seem that ghidra is better but i always come back to ida because ghidra has so much problem !

Edit:

Dynamic analysis can be tricky with all the padding and crap added by beebyte i find the code jumping all other the place really confusing
 
  • Like
Reactions: haste

npomme

Member
Nov 20, 2020
410
621
Anyway, I found some more time to look at it. Content is encrypted on-disk and gets decrypted through a field from the Patreon request. Essentially, you can't just patch the program to say blindly say "oh okay this unregistered user does have access," you'll need to figure out the encryption scheme and incorporate a keygen. Alternatively, a paid user could theoretically just dump the encrypted files from memory and then the crack would be distributed with those now-decrypted files
the program fallback to login screen if decryption fail and throw lorem ipsum errors and array out of bound error too and i find really weird the fact that they use so much array inside this decryption code
 
Last edited:

haste

Newbie
Jul 27, 2018
30
26
I'm using ida pro and debuger work but you need to consider that :

1707947275799.png
I actually am working on AMD64 cpu but doing the actual patch is still far away from my grasp currently anyway, I need to level up my skill first.
As others suggested, the way I was thinking of potentially going about this was to just make a MelonLoader plugin to execute the code inside the game, instead of messing with the executable itself.

It looks like I'm going to stay with Ghidra + x64dbg and see what I need for making the actual hack when I have clearer picture of what the hell I am even doing. Ghidra did it's decompiling job so far.

Thank you for the warning though. Worse case scenario I will have to patch the assembly by hand (if I even get to that point). At least it will be an interesting experience :HideThePain:

Dynamic analysis can be tricky with all the padding and crap added by beebyte i find the code jumping all other the place really confusing
Yeah, I expected this. With my skill and knowledge, I am already facing an impossible task. I don't think it can get any harder for me lmao.
 
Mar 1, 2020
88
82
The game was blocked using an obfuscator, one bastard laughs that he bought the game and others can't (now his message has been deleted), and I made 5 characters in the build 2023-11-06 and redesigned them.

1.png 2.png 3.png 4.png 5.png
 
3.90 star(s) 9 Votes