tag:blogger.com,1999:blog-6529214450571125804.post2357752477532782974..comments2023-10-24T03:54:01.809-07:00Comments on Reverse Engineering 101: The First ExerciseAnonymoushttp://www.blogger.com/profile/06337289974571933882noreply@blogger.comBlogger7125tag:blogger.com,1999:blog-6529214450571125804.post-63883995590585268042021-09-25T02:15:23.839-07:002021-09-25T02:15:23.839-07:00Really awesome blog!!! I finally found a great pos...Really awesome blog!!! I finally found a great post here.<br /><a href="https://sixdengineering.com/scan-to-bim-services/californa-bim-services.php" rel="nofollow">Scan to BIM in California</a><br /><a href="https://sixdengineering.com/3d-laser-scanning-modelling/georgia.php" rel="nofollow">3d Laser Scanning Services in Georgia</a><br /><a href="https://sixdengineering.com/reverse-engineering/californa.php" rel="nofollow">Reverse Engineering Services in California</a><br /><a href="https://sixdengineering.com/point-cloud-to-3d-model-services/reading.php" rel="nofollow">Point cloud to 3D Model Reading</a><br />SixD Engineering Solutionshttps://www.blogger.com/profile/06735065638934509050noreply@blogger.comtag:blogger.com,1999:blog-6529214450571125804.post-21900021425945621852014-01-26T21:49:40.113-08:002014-01-26T21:49:40.113-08:00You can use trial and error. But you should also u...You can use trial and error. But you should also use some thought to lessen your area of testing. Try sometime after the console is loaded.Anonymoushttps://www.blogger.com/profile/06337289974571933882noreply@blogger.comtag:blogger.com,1999:blog-6529214450571125804.post-1771418746850777622014-01-26T05:16:36.222-08:002014-01-26T05:16:36.222-08:00Oh alright. So how can we determine how far before...Oh alright. So how can we determine how far before to place the JMP. Or do we have to use a trial and error method? <br />Thank you.Anonymoushttps://www.blogger.com/profile/14842284616477299032noreply@blogger.comtag:blogger.com,1999:blog-6529214450571125804.post-60985060994196472392014-01-25T13:10:13.043-08:002014-01-25T13:10:13.043-08:00Reversing is a multidisciplinary field. In order t...Reversing is a multidisciplinary field. In order to get better and better at it, you will find you must pull together many different arts; programming ,networking, operating system internals, maybe some security theory, and more. But this ultimately depends on what you want to reverse and how far you want to go. <br /><br />For breaking games or crackmes you don't need all of that (depends), but when you enter the realm of security you will see a natural need for more knowledgeAnonymoushttps://www.blogger.com/profile/06337289974571933882noreply@blogger.comtag:blogger.com,1999:blog-6529214450571125804.post-72886592054069724272014-01-25T13:05:26.778-08:002014-01-25T13:05:26.778-08:00Thanks for your comment Rohan. If you mean to repl...Thanks for your comment Rohan. If you mean to replace the assembly CALL before the CMP, then I fear the program would break. You may change the assembly of the CMP itself though, or the JNE below the CMP instruction. If you are referring to placing a JMP somewhere way before the password even compares, then yes =) its possible. In bigger programs somethings might go haywire though Anonymoushttps://www.blogger.com/profile/06337289974571933882noreply@blogger.comtag:blogger.com,1999:blog-6529214450571125804.post-34219606481708195432014-01-25T06:35:38.464-08:002014-01-25T06:35:38.464-08:00A very nice and elaborate tutorial. I guess i have...A very nice and elaborate tutorial. I guess i have an idea for another way to patch the crackme. Can we use the JMP command just before the password comparison and make it JMP the execution to the statement where it prints success? <br /><br />Thank you.Anonymoushttps://www.blogger.com/profile/14842284616477299032noreply@blogger.comtag:blogger.com,1999:blog-6529214450571125804.post-48460509451027129492014-01-17T08:07:41.834-08:002014-01-17T08:07:41.834-08:00Man, you are a saint. Learning how to START revers...Man, you are a saint. Learning how to START reverse engineering seems like it's harder than the actual reverse engineering.<br /><br />Thanks!Anonymousnoreply@blogger.com