Results 1 to 4 of 4

Thread: Reverse engineering

  1. #1
    Ninja Code Monkey
    Join Date
    Nov 2001
    Location
    Washington State
    Posts
    1,027

    Question Reverse engineering

    What online resources do you generally hit up and recommend for this subject?

    What tools do you use on windows and/or linux to do your work on this topic?
    "When I get a little money I buy books; and if any is left I buy food and clothes." - Erasmus
    "There is no programming language, no matter how structured, that will prevent programmers from writing bad programs." - L. Flon
    "Mischief my ass, you are an unethical moron." - chsh
    Blog of X

  2. #2
    Senior Member t34b4g5's Avatar
    Join Date
    Sep 2003
    Location
    Australia.
    Posts
    2,391
    Probably give that page a go. A little old, but should give you what you are looking for.

    http://www.woodmann.com/crackz/Getstart.htm

    http://www.woodmann.com/crackz/Tools.htm

  3. #3
    Junior Member
    Join Date
    Mar 2003
    Posts
    12
    I'll write in this thread even though its old and give the people some tips if anyone steps into this topic

    Good online tools for analysing is sandboxes, for example Anubis (http://anubis.iseclab.org) & ThreatExpert (http://www.threatexpert.com)

    Other tools that will come in handy when reversing some binaries is debuggers, dissemblers (IDA & OllyDBG is my tools of choice) Sysinternals 'Strings' and Hex editors might also help you if you wanna do a quick look
    silent play in the shadow of power...

  4. #4
    AntiOnline Senior Member souleman's Avatar
    Join Date
    Oct 2001
    Location
    Flint, MI
    Posts
    2,883
    It also depends a lot on the language. Some languages are extremely easy (can even find online tools to do it for you) unless they are properly obfuscated.

    There was one... can't remember what it was called, that was online. It could disssamble most c, c++, java, and php files. They had a pay version that was more robust and worked with more languages (I think they even had crap back in the pl1 days). Basically they were trying to sell their obfuscator software.

    If it was coded properly (haha like that happens), then you wil lprobably have to use crim's idea and sandbox it, then step through the program.
    \"Ignorance is bliss....
    but only for your enemy\"
    -- souleman

Similar Threads

  1. Replies: 4
    Last Post: November 10th, 2004, 07:58 AM
  2. Reverse Engineering (Tutorial)
    By sec_ware in forum The Security Tutorials Forum
    Replies: 8
    Last Post: October 14th, 2004, 09:06 PM
  3. Social Engineering: Part I
    By Remote_Access_ in forum The Security Tutorials Forum
    Replies: 14
    Last Post: January 15th, 2003, 03:31 AM
  4. Social Engineering: The Overview
    By jdenny in forum The Security Tutorials Forum
    Replies: 8
    Last Post: August 29th, 2002, 10:17 AM
  5. The Ultimate Social Engineering tutorial!
    By Isellcrack4FBI in forum AntiOnline's General Chit Chat
    Replies: 2
    Last Post: July 4th, 2002, 02:40 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •