Download Introduction To The Cracking With Ollydbg From Zero

Introduction To The Cracking With Ollydbg From Zero

Introduction To The Cracking With Ollydbg From Zero
Introduction To The Cracking With Ollydbg From Zero


Contents

01 – KNOWING Ollydbg – INSTALLATION
02 – Number Systems – positive numbers – NEGATIVE – ASCII – THAT IS THE STACK
03 – RECORDS AND FLAGS
04 – ASSEMBLER INSTRUCTIONS – NOP, PUSH, POP, PUSHAD, POPAD, MOV, movsx, MOVZX, LEA, xchg,
05 – MATHEMATICS INSTRUCTIONS – INC, DEC, ADD, ADC, SUB, SBB, MUL, IMUL, DIV, IDIV, xadd, NEG
LOGIC INSTRUCTIONS – AND, XOR, OR, NOT –
06 – INSTRUCTIONS – COMPARISONS AND CONDITIONAL JUMPS
07 – INSTRUCTIONS – CALL AND RET
08 – INSTRUCTIONS FOR LOOPS OR CYCLES (LOOP)
09 – FIRST APPROACH TO CRACKING – crackme OF CRUEHEAD
10 – Breakpoints – COMMON BP, ON MEMORY
11 – Breakpoints – Breakpoints HARDWARE – BP CONDITIONAL
12 – Windows messages – BP STANDING IN WINDOWS MESSAGES
13 – REVERSING AND SERIAL PEZCANDO
14 – REVERSING AND SERIAL PEZCANDO – HARCODED SERIALS
15 – REVERSING AND SERIAL PEZCANDO – HARCODED SERIALS
16 – REVERSING AND SERIAL PEZCANDO – HARCODED SERIALS
17 – REVERSING AND SERIAL PEZCANDO – HARCODED SERIALS – LOOKING FOR SERIAL IN MEMORY (WHEN WE HAVE BUTTON CHECK)
18 – REVERSING AND SERIAL PEZCANDO – LOOKING FOR SERIAL IN MEMORY (WHEN WE HAVE BUTTON CHECK)
19 – PROTECTION ANTIDEBUGGER – how to avoid manually with plugins – api: IsDebuggerPresent –
20 – PROTECTION ANTIDEBUGGER – how to avoid manually with plugins – NAME OF PROCESS – api: EnumProcesses
21 – PROTECTION ANTIDEBUGGER – how to avoid manually with plugins – PROCESS BY NAME – by name or window class – api: CreateToolhelp32Snapshot, Process32First, Process32Next, FindWindowA
22 – PROTECTION ANTIDEBUGGER – how to avoid manually with plugins – apis: UnhandeldExceptionFilter – ZwQueryInformationProcess
23 – PROTECTION ANTIDEBUGGER – how to avoid manually with plugins – ProcessHeapFlag and NTGlobalFlag
24 – PROTECTION ANTIDEBUGGER – Solving the Antisocial Part 23
25 – EXCEPTIONS
26 – Crackeando VISUAL BASIC – NAGS
27 – Crackeando VISUAL BASIC – NAGS, METHOD 4C
28 – Crackeando VISUAL BASIC – GRAFT IN DLL (AMENDED)
29 – Crackeando VISUAL BASIC – P-CODE
30 – Crackeando VISUAL BASIC – Part 2 P-CODE
31 – UNPACKING – Definitions BASIC
32 – UNPACKING – SEARCH OPCODES, Olly FINDER EPO, PUSHADD METHOD, METHOD EXCEPTIONS, widely used API method, METO EXECUTED FIRST API
33 – UNPACKING – IS IAT and how to repair
34 – UNPACKING – using PE TOOLS, ImpREC
35 – UNPACKING – WITH OllyDump, ImpREC (EXAMPLE ASPACK)
36 – UNPACKING – WITH OllyDump, ImpREC (OTHER PRACTICAL EXERCISE)
37 – UNPACKING – REPAIR redirected TICKETS
38 – UNPACKING – REPAIR redirected TICKETS
39 – STOLEN BYTES AND SCRIPTS
40 – SCRIPTS (UNPACKING THE PELock)
41 – SCRIPTS (CONT UNPACKING THE PELock.)
42 – UNPACKING – STOLEN BYTES (ACPROTECT 1.09)
43 – UNPACKING – REPAIR STOLEN BYTES (ACPROTECT 1.09)
44 – UNPACKING – REPAIR IAT – SCRIPTS (ACPROTECT 1.09)
45 – UNPACKING – REPAIR IAT – DUMPEADO (ACPROTECT 1.09)
46 – UNPACKING – FATMIKE
47 – UNPACKING – FATMIKE (Part 2)
48 – UNPACKING – 1,304 PESpin
49 – UNPACKING – REPAIR IAT – PESpin 1,304 (Part 2)
50 – UNPACKING – ANOTHER EXAMPLE
51 – UNPACKING – Asprotect
52 – UNPACKING – Asprotect (CONTINUED)
53 – UNPACKING – Asprotect (CONTINUED)
54 – UNPACKING – EXECryptor
55 – UNPACKING – EXECryptor (CONTINUED) – IAT SCRIPT TO REPAIR
56-EXECryptor v2.2.50.b unshelling
57-EXECryptor v2.2.50.c/d/e/f/g unshelling
58-EXECryptor v2.2.50.h unshelling

Only for V.I.P
Warning! You are not allowed to view this text.
  • 70