History view
Today in this part of the course we will reverse a program to recover passwords in RAR files.
https://download.cnet.com/RecoverPassword-Rar-Password-Recover/3000-18501_4-78328724.html
The program is in .NET therefore we will not have to see assembly language, it will be much easier. When we open the program we see a tab that indicates if we want to register the program we click, and now we should be able to see a dialog box to introduce the license.

We introduce random characters and in the control structure it will be directed towards a false return value. Simply by modifying in memory false as true we would already have the program registered!.

And ready we would have the program registered for life.

'Cracking' 카테고리의 다른 글
| Binary patching 0x4 (0) | 2019.11.18 |
|---|---|
| Binary patching 0x2 (0) | 2019.11.09 |
| Introduction and purpose 0x1 (0) | 2019.10.30 |
- Total
- Today
- Yesterday
- theFaunia course
- open-redirect
- cracking
- buffer overflow
- 32Bit
- return oriented programming
- Windows
- fake stack frame
- leak stack memory address
- Backdoors
- Call oriented programming
- use after free
- leak libc
- ASM
- pwnable.tw
- format string
- canary
- arithmetic overflow/underflow
- html injection
- GOT Dereferencing/Overwriting
- one gadget
- pwnable.xyz
- Pwnable.kr
- write primitive
- XSS
- shellcode
- dnspy
- stack pivot
- hijacking redirection flow
- x64dbg
| 일 | 월 | 화 | 수 | 목 | 금 | 토 |
|---|---|---|---|---|---|---|
| 1 | 2 | 3 | 4 | 5 | 6 | |
| 7 | 8 | 9 | 10 | 11 | 12 | 13 |
| 14 | 15 | 16 | 17 | 18 | 19 | 20 |
| 21 | 22 | 23 | 24 | 25 | 26 | 27 |
| 28 | 29 | 30 | 31 |