It is expected that their machine must be configured with the following tools The security researcher must have rigorous knowledge of Assembly Programming language. We just have only the executable version of a particular application which is in fact, a tedious task in context of Reverse Engineering. In simple term, what we are implying that we don’t have the actual source code indeed. This time, we are confronting with an application which origin is unknown altogether. We have already done much of reversing of. Although, there are much of tools that can achieve the same objective but the beauty behind OllyDbg is that, it is simple to operate and freely available. The objective of writing this paper is to manifest, how to crack an executable without peeping its source code by exercising OllyDbg tool.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
June 2023
Categories |