VMware

I Cracked This Program AUTOMATICALLY (easy reverse

I Cracked This Program AUTOMATICALLY (easy reverse engineering)

#Cracked #Program #AUTOMATICALLY #easy #reverse

“Low Level Learning”

Reverse engineering is a great way to learn about how computers work. Whether its malware analysis or just solving some problems, reverse engineering is a fun way to enhance your knowledge of computers. In today’s video, we reverse engineer a problem from crackmes.one and use an interesting…

source

 

To see the full content, share this page by clicking one of the buttons below

Related Articles

47 Comments

  1. I got into it back in the day because I bought a amiga game, it didn't run and the shop refused to refund. Got in touch with the local computer hobbies group, they knew about the problem with the game but still took the time to introduced me to 68k debugging and disassembly. Got the game running. Group introduced me to sas/c compiler. The rest is history. Also did step through every software I had to be fascinated and also to understand how it worked. 68k simpler times …

    It is a valuable skill to have.

  2. For anyone here new to Python,

    if __ name __ == "__main__":
    main()

    prevents the main function from running when you import the file/script somewhere else. If you call a function after defining it without this check, it will run even if the file is imported, which you usually don't want

    Edit: had to insert spaces between the underscores and name because YT thought I wanted it italic. In actual code, it would be 2 underscores, name, 2 underscores (no spaces between); sometimes read as "dunder name" (concatenating/abbreviating "double underscore" to "dunder")

  3. Meh, automating the reverse engineering takes the fun out of the problem :p if each of those functions was only checking one of the bytes, you could solve each fairly simply, I'd imagine.

Leave a Reply