TransWikia.com
  1. All Categories
  2. Reverse Engineering

Reverse Engineering : Recent Questions and Answers (Page 13)

Find answers to your questions about Reverse Engineering or help others by answering their Reverse Engineering questions.

How use signature pattern for hooking

I like to replace the static function address: AddressOfHookSoundFunction = (DWORD)GetModuleHandleA("myfile.exe") + 0x0F3B65; // good: 4406117 (integer)using signature pattern: SigScan Scanner; AddressOfHookSoundFunction = Scanner.FindPattern("myfile.exe", "x55x8BxECx83xECx14x53x56x8B", "xxxxxxxxx"); // bad:...

Asked on 07/15/2021

1 answer

ollydbg: CMP - what the difference

What is the difference between:MOV SI,WORD PTR DS:[ESI+0D]CMP SI,1388andCMP WORD PTR DS:[ESI+0d],1388 ...

Asked on 07/14/2021 by Andrey Mironov

1 answer

Loading a U-Boot ARM flash image into IDA Pro

I have a U-Boot image file which was extracted from flash memory of a board with an Hi3520D ARM CPU. I would like to load this file into IDA Pro...

Asked on 07/13/2021 by nyaol9

0 answer

QEMU with GDB: Stepping Instruction causes Windows VM BSOD

I'm currently analyzing a piece of software inside a Windows 10 QEMU virtual machine which is connected to a remote GDB debugger. I have set breakpoints to audit what the...

Asked on 07/13/2021 by Coburn64

0 answer

convert this x86 ASM to C?

How could this 32-bit x86 assembly be written in C?loc_536FB0:mov cl, [eax]cmp cl, ' 'jb short loc_536FBCcmp cl, ','jnz short loc_536FBFloc_536FBC:mov byte ptr [eax], ' 'loc_536FBFmov cl, [eax+1]inc eaxtest...

Asked on 07/13/2021 by user1365830

4 answer

PE32+ executable : .text segment encryption

I am working on PE segment encryption(in C++). I completed the PE32 .text segment encryption. I added stub segment to the PE that will decrypt .text segment at runtime. Used...

Asked on 07/09/2021 by AcCoder

2 answer

Right way to reverse a VM

I'm currently reversing a virtualized sample that uses a custom VM bytecode. After defeating the anti-disassembly tricks I'm finally faced with the vm_dispatch function. I have to figure out...

Asked on 07/08/2021

0 answer

Help required to figure out the JTAG or UART pins

I have an old CDMA dongle lying around, so I thought to try to reverse engineer them, but am unable to figure out the UART or JTAG pins, I have...

Asked on 07/05/2021 by Raghav Varmani

0 answer

Reverse Engineering an ERP interface written in Flash

My college has its ERP platform in a Flash interface, accessible only via Internet Explorer. I am looking into ways I can interface with it via things like ...

Asked on 07/05/2021 by Blaine

2 answer

Convert series of hex digits represented as ASCII-characters stored in a .txt file to raw bytes

I recently extracted a bunch of raw bytes (from wireshark) into a regular .txt file. Because these raw bytes are stored in a text file, all those hex-digits...

Asked on 07/03/2021

2 answer

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP