Description: This video is simple demo of cracking a software. The tools used in demo are Hiew32 and W32DSM. In video a keylogger software bpk2009 is reverse engineered with Hiew32 and W32DSM. The objective is to reversed engineered the software and bypass the registration code. First bpk2009 is installed on the windows system. After that it is opened in W32DSM and by using text search option try to find out registration code. After getting it try to find the conditional jump address. In this case this is the address to which control will transfer if somebody enters wrong registration code. we note that address. Now just drag the executable on the Hiew32 to open it with it. Search for that conditional jump address previously noted and change as per as video.
Source : solagroups from youtube
For Hiew32 http://tiny.cc/x1vm7
For W32DSM http://tiny.cc/mg03z
For bpk2009 http://bit.ly/cCd9Lt
Tags: reverse-engineering ,
Latest from the SecurityTube Blog:
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.