reverse-engineering

How to Protect an Exe File from Decompilation

谁说胖子不能爱 提交于 2020-01-31 03:50:06
问题 What are the methods for protecting an Exe file from Reverse Engineering.Many Packers are available to pack an exe file.Such an approach is mentioned in http://c-madeeasy.blogspot.com/2011/07/protecting-your-c-programexe-files-from.html Is this method efficient? 回答1: The only good way to prevent a program from being reverse-engineered ("understood") is to revise its structure to essentially force the opponent into understanding Turing Machines. Essentially what you do is: take some problem

assembly jmp to a line that doesn't exist

怎甘沉沦 提交于 2020-01-25 08:01:05
问题 For the line that says "jmpq *0x400850", there is actually no such line has 0x400850. In this case, since I cannot jump to the place that it is mentioned, do I just skip this command and go to the command that is in the line below? So the answers told me to type "objdump" in terminal, so I typed objdump -d ./bin-lab-ref > output.txt and I got no output in the terminal. What should I do in this situation? 回答1: The instruction jmpq *0x400850(,%rax,8) jumps to the value stored at address

Reverse engineer database from an Oracle database

末鹿安然 提交于 2020-01-23 16:51:18
问题 I would like to know if there is any tool able to extract the design from an existing Oracle database. I have a read access to it and I would like to have the design. Or simply export it to a *.sql and then read it with any tool able to create the design with the links between the tables. Something like that (source: fileguru.com) Thank you very much. 回答1: There are a number of tools which do reverse engineering from an Oracle database, but most require a license. Oracle has its own Data

@SequenceGenerator - allocationSize, reverse engineering with Eclipse Hibernate Tools

跟風遠走 提交于 2020-01-23 03:07:58
问题 I use the Eclipse Hibernate Tools to create domain classes with JPA annotations from my Oracle database. To control sequence generation I have added the following entry to the hibernate.reveng.xml: ... <primary-key> <generator class="sequence"> <param name="sequence">SEQ_FOO_ID</param> </generator> </primary-key> ... This results in the following annotation: @SequenceGenerator(name = "generator", sequenceName = "SEQ_FOO_ID") However I need to set the "allocationSize" like this:

What is wrong with this __usercall wrapper?

与世无争的帅哥 提交于 2020-01-16 13:13:12
问题 /* * Wrapper from * int func(int a, int b, int c, unsigned int d, signed int e); * to * int __usercall func<eax>(int a<eax>, int b<ecx>, int c, unsigned int d, signed int e); */ int func(int a, int b, int c, unsigned int d, signed int e) { __asm { push e push d push c mov ecx, b mov eax, a call __usercall_func // access violation somewhere inside here add esp, 12 } } 回答1: You cannot perform ret yourself from within an inline asm block, because you don't know what the outer function has done

How to interpret the final 0x03 0x00 in this minimal gzip sample?

妖精的绣舞 提交于 2020-01-16 10:45:10
问题 I'm reading gzip format specification, trying to understand byte-to-byte the following minimal example (generated using echo -n | gzip > /tmp/a.gz ): 00000000 1f 8b 08 00 70 3c b4 5d 00 03 03 00 00 00 00 00 |....p<.]........| 00000010 00 00 00 00 |....| 00000014 I managed to map most of the bytes, but the "03 00" is something I cannot interpret. I wrote a Python script to fuzz different values for the "03" byte, but nothing other than that byte is allowed: [15:13:05]>>> import subprocess [15

How to interpret the final 0x03 0x00 in this minimal gzip sample?

a 夏天 提交于 2020-01-16 10:44:05
问题 I'm reading gzip format specification, trying to understand byte-to-byte the following minimal example (generated using echo -n | gzip > /tmp/a.gz ): 00000000 1f 8b 08 00 70 3c b4 5d 00 03 03 00 00 00 00 00 |....p<.]........| 00000010 00 00 00 00 |....| 00000014 I managed to map most of the bytes, but the "03 00" is something I cannot interpret. I wrote a Python script to fuzz different values for the "03" byte, but nothing other than that byte is allowed: [15:13:05]>>> import subprocess [15

How to interpret the final 0x03 0x00 in this minimal gzip sample?

半城伤御伤魂 提交于 2020-01-16 10:43:29
问题 I'm reading gzip format specification, trying to understand byte-to-byte the following minimal example (generated using echo -n | gzip > /tmp/a.gz ): 00000000 1f 8b 08 00 70 3c b4 5d 00 03 03 00 00 00 00 00 |....p<.]........| 00000010 00 00 00 00 |....| 00000014 I managed to map most of the bytes, but the "03 00" is something I cannot interpret. I wrote a Python script to fuzz different values for the "03" byte, but nothing other than that byte is allowed: [15:13:05]>>> import subprocess [15

Reverse Engineer contents of a Binary File?

纵然是瞬间 提交于 2020-01-16 01:06:08
问题 I am creating a binary file for registered users of my application. The user already knows what information is stored in the file because he is providing me with that information while registering. Every time my application is launched the registration file is read and compared with the information obtained from hardware. So I am concerned whether "power users" would be able to understand the logic in which the information is stored in the file. Long story short, is it possible to reverse

I'm trying to get the base address of loaded dylibs in osx

独自空忆成欢 提交于 2020-01-15 12:13:50
问题 Well, i am trying to get the baseadresses for Loaded OSX Dylibs in running Proccesses on run time since a longtime now. Ive dumped all attached Dylibs on runtime using dyld_all_image_infos after using task_info, got there name and ImageLoadADDRESS,mach_header and segment_command. But i can't get there Baseaddress On runtime.. Everything works great except that i'm confused on how to get the actual Baseaddress of the requested Image in runtime! Also my Magic number which i got after Getting