User submitted program reverse in OLLYDBG
in this video we analyze a user submitted program and we reverse engineer it to work as if it was activated. we accomplish this by applying some of the techniques we have seen in the past. in the end we take the easy way out and save a modified version of the program.. but we only change 2 bytes... if we wanted to spend the time to filter through the series of algorythms that this program uses to make a keygen, we could but this program is old enough now that it really wouldn't be worth it...
Видео User submitted program reverse in OLLYDBG канала Give Academy
Видео User submitted program reverse in OLLYDBG канала Give Academy
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Reverse Engineering 1Reverse engineering C programs - bin 0x10Music Software & Bad Interface Design: Avid’s Sibelius27c3: Reverse Engineering the MOS 6502 CPU (en)How to Crack a program using OllyDbg 1Obfuscated VBA, Powershell, C# Malware AnalysisDisabling an anti-debugger methodEnhancing photo's in movies - what software are they using?Reverse Engineering BasicsSOLIDWORKS In depth - Reverse Engineering ProductsMMORPG Bot Reverse Engineering and TrackingIntroduction to Reverse Engineering | Ollydbg TutorialIntro to x86 Assembly Language (Part 1)REcon 2013 - Hardware reverse engineering tools (Olivier Thomas)Reversing for Newbies - Pt 1: Binary Patching (Lena151 Assembly Tutorials)How To Crack A Software Using Ollydbg | Easy Software CrackingAccess Internal Networks with Reverse VPN connections - Hak5 1921Reverse Engineering Android Applications - Tom KeetchThe Beginner's Guide to Excel - Excel Basics TutorialObfuscated C programs: Introduction