History view
Today in this part of the course we will reverse a program to recover passwords in RAR files.
https://download.cnet.com/RecoverPassword-Rar-Password-Recover/3000-18501_4-78328724.html
The program is in .NET therefore we will not have to see assembly language, it will be much easier. When we open the program we see a tab that indicates if we want to register the program we click, and now we should be able to see a dialog box to introduce the license.
We introduce random characters and in the control structure it will be directed towards a false return value. Simply by modifying in memory false as true we would already have the program registered!.
And ready we would have the program registered for life.
'Cracking' 카테고리의 다른 글
Binary patching 0x4 (0) | 2019.11.18 |
---|---|
Binary patching 0x2 (0) | 2019.11.09 |
Introduction and purpose 0x1 (0) | 2019.10.30 |
- Total
- Today
- Yesterday
- fake stack frame
- Backdoors
- use after free
- return oriented programming
- theFaunia course
- Call oriented programming
- canary
- XSS
- Windows
- open-redirect
- pwnable.tw
- buffer overflow
- ASM
- arithmetic overflow/underflow
- dnspy
- html injection
- one gadget
- shellcode
- hijacking redirection flow
- leak stack memory address
- 32Bit
- format string
- Pwnable.kr
- x64dbg
- pwnable.xyz
- stack pivot
- cracking
- GOT Dereferencing/Overwriting
- write primitive
- leak libc
일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | 3 | ||||
4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 | 16 | 17 |
18 | 19 | 20 | 21 | 22 | 23 | 24 |
25 | 26 | 27 | 28 | 29 | 30 | 31 |