History view
Today in this part of the course we will reverse a program to recover passwords in RAR files.
https://download.cnet.com/RecoverPassword-Rar-Password-Recover/3000-18501_4-78328724.html
The program is in .NET therefore we will not have to see assembly language, it will be much easier. When we open the program we see a tab that indicates if we want to register the program we click, and now we should be able to see a dialog box to introduce the license.

We introduce random characters and in the control structure it will be directed towards a false return value. Simply by modifying in memory false as true we would already have the program registered!.

And ready we would have the program registered for life.

'Cracking' 카테고리의 다른 글
Binary patching 0x4 (0) | 2019.11.18 |
---|---|
Binary patching 0x2 (0) | 2019.11.09 |
Introduction and purpose 0x1 (0) | 2019.10.30 |
- Total
- Today
- Yesterday
- write primitive
- XSS
- buffer overflow
- stack pivot
- fake stack frame
- hijacking redirection flow
- open-redirect
- Windows
- Backdoors
- leak libc
- leak stack memory address
- cracking
- theFaunia course
- canary
- GOT Dereferencing/Overwriting
- ASM
- pwnable.tw
- shellcode
- arithmetic overflow/underflow
- Call oriented programming
- html injection
- return oriented programming
- Pwnable.kr
- 32Bit
- dnspy
- use after free
- pwnable.xyz
- one gadget
- format string
- x64dbg
일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | ||
6 | 7 | 8 | 9 | 10 | 11 | 12 |
13 | 14 | 15 | 16 | 17 | 18 | 19 |
20 | 21 | 22 | 23 | 24 | 25 | 26 |
27 | 28 | 29 | 30 |