History view
Today in this part of the course we will reverse a program to recover passwords in RAR files.
https://download.cnet.com/RecoverPassword-Rar-Password-Recover/3000-18501_4-78328724.html
The program is in .NET therefore we will not have to see assembly language, it will be much easier. When we open the program we see a tab that indicates if we want to register the program we click, and now we should be able to see a dialog box to introduce the license.
We introduce random characters and in the control structure it will be directed towards a false return value. Simply by modifying in memory false as true we would already have the program registered!.
And ready we would have the program registered for life.
'Cracking' 카테고리의 다른 글
Binary patching 0x4 (0) | 2019.11.18 |
---|---|
Binary patching 0x2 (0) | 2019.11.09 |
Introduction and purpose 0x1 (0) | 2019.10.30 |
Comments
Notice
Recent Posts
Recent Comments
- Total
- Today
- Yesterday
Link
TAG
- Call oriented programming
- theFaunia course
- html injection
- pwnable.tw
- canary
- Pwnable.kr
- fake stack frame
- ASM
- return oriented programming
- dnspy
- XSS
- Windows
- pwnable.xyz
- stack pivot
- buffer overflow
- use after free
- shellcode
- Backdoors
- cracking
- leak stack memory address
- open-redirect
- format string
- x64dbg
- leak libc
- write primitive
- 32Bit
- GOT Dereferencing/Overwriting
- arithmetic overflow/underflow
- one gadget
- hijacking redirection flow
일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | ||||||
2 | 3 | 4 | 5 | 6 | 7 | 8 |
9 | 10 | 11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 | 21 | 22 |
23 | 24 | 25 | 26 | 27 | 28 |
Archives