Reverse Engineering Tutorial
Reverse Engineering Ethical Hacking Tutorial :- “Uncover the inner workings of technology through Reverse Engineering. Explore the process of dissecting software and hardware to understand their functionalities, enhance security measures, and unleash innovation. Gain insights into reverse engineering methodologies, tools, and applications to stay ahead in a rapidly evolving digital landscape.”
1. Custom Based Applciation Cracking in Reverse Engineering
2. BPK Keylogger Detector in Reverse Engineering
3. Power ISO in Reverse Engineering
Reverse Engineering via File Manipulation
1. BPK Key Logger Detector
Registration error
—————————
Registration code or user name is invalid. Please check all fields and try again!
—————————
OK
—————————EAX 0018EB1C ASCII “QEDSGMLEFPFDGTPM”
ECX 0018EB2B
EDX 0000004D
EBX 00000001
ESP 0018EB0C
EBP 0018EB78
ESI 763B2B7A kernel32.lstrcatA
EDI 0017016A
EIP 00404994 antispy.00404994
C 0 ES 002B 32bit 0(FFFFFFFF)
P 1 CS 0023 32bit 0(FFFFFFFF)
A 1 SS 002B 32bit 0(FFFFFFFF)
Z 0 DS 002B 32bit 0(FFFFFFFF)
S 0 FS 0053 32bit 7EFDD000(FFF)
T 0 GS 002B 32bit 0(FFFFFFFF)
D 0
O 0 LastErr ERROR_SUCCESS (00000000)
EFL 00000216 (NO,NB,NE,A,NS,PE,GE,G)
ST0 empty -??? FFFF 00000066 00660066
ST1 empty -??? FFFF 00000000 00083600
ST2 empty -??? FFFF 00000000 00010000
ST3 empty 555.99998757243156440
ST4 empty 27.999993383884429930
ST5 empty 0.0
ST6 empty 16.000000000000000000
ST7 empty 16.000000000000000000
3 2 1 0 E S P U O Z D I
FST 4000 Cond 1 0 0 0 Err 0 0 0 0 0 0 0 0 (EQ)
FCW 027F Prec NEAR,53 Mask 1 1 1 1 1 1
EAX 0018EB1C ASCII ”
”
ECX 0018EB2B
EDX 00000041
EBX 00000001
ESP 0018EB0C
EBP 0018EB78
ESI 763B2B7A kernel32.lstrcatA
EDI 00180144
EIP 00404994 antispy.00404994
C 0 ES 002B 32bit 0(FFFFFFFF)
P 1 CS 0023 32bit 0(FFFFFFFF)
A 1 SS 002B 32bit 0(FFFFFFFF)
Z 0 DS 002B 32bit 0(FFFFFFFF)
S 0 FS 0053 32bit 7EFDD000(FFF)
T 0 GS 002B 32bit 0(FFFFFFFF)
D 0
O 0 LastErr ERROR_SUCCESS (00000000)
EFL 00000216 (NO,NB,NE,A,NS,PE,GE,G)
ST0 empty -??? FFFF 00000066 00660066
ST1 empty -??? FFFF 00000000 00083600
ST2 empty -??? FFFF 00000000 00010000
ST3 empty 1266.9999716803431510
ST4 empty 1.0000000000000000000
ST5 empty 1.0000000000000000000
ST6 empty 16.000000000000000000
ST7 empty 16.000000000000000000
3 2 1 0 E S P U O Z D I
FST 4020 Cond 1 0 0 0 Err 0 0 1 0 0 0 0 0 (EQ)
FCW 027F Prec NEAR,53 Mask 1 1 1 1 1 1
Username –> Vinayak
Key –> QEDSGMLEFPFDGTPM
username –> lucifer
key –> BBRKDIEHABNGCKOA
2. SMAC2.0
—————————
SMAC 2.0
—————————
Invalid Registration ID.
—————————
OK
—————————
Invalid Registration ID entered.
Text strings referenced in SMAC:.text, item 5105
Address=0048BCF6
Disassembly=PUSH SMAC.00438AB8
Text string=UNICODE “-375M-3932-563F-4967”
SMC2U-375M-3932-563F-4967
—————————
SMAC 2.0
—————————
Invalid Registration ID entered.
—————————
OK
—————————
004874EF . C785 58FFFFFF >MOV DWORD PTR SS:[EBP-A8],SMAC.00438A48 ; UNICODE “This product has been successfully registered.”
JMP 004874EF
—————————
SMAC 2.0
—————————
This product has been modified and will shutdown.
—————————
OK
—————————
https://challenges.re/
Follow Us On Cyber Point Solution Youtube Channel : Click Here
Follow Us on Social Platforms to get Updated : twiter, facebook, Google Plus
Learn More Ethical Hacking and Cyber Security click on this link. cyber security