Codebreaker's Magazine |
The Free Online Magazine for Reverse-Engineers |
In this magazine you will find lots of information.
The main audience for this magazine should be software protectionists and reverse-engineers, but we even try to include some "off-topic" articles which could be with some interest for the audience.
This is the second release, so for sure not everything is like it should be. If you have any positive or negative critics feel free to contact as at codebreakers@anticrack.de. If you have any ideas how we can get better or if you want to contribute an article contact us too.
So this issue seems to be a little big?
Well, we try to include as much informations we can, but we tried to make a hard selection on what we publish. Anyway, we produced many pages. This magazine should not be a "collection" of four or five tutorials. It should be like a real magazine you can buy. The main part will be (sure) the reverse-engineering part. Additionally, we included some interesting freestyle articles which are of interest. As well we'll have a look at the VX scene which always deals with interesting coding-techniques and anti-tricks.
Let me say thanks to all the contributors which helped to realize this magazine. The issues will be released irregulary - this means the next release will be published during the next 2 or 3 months. If everything starts running as we want and we get more feedback, we are (maybe) able to publish every month. But first see how this issue gives feedback.
Zero - Main Author (21.July 2003)
Editorial Team
Chief Editor: Zero Zero Reverse Code Engineering Editor: PE Pegasus Software Engineering Editor: PE Pegasus Tool Reviews Editor: PE Pegasus VX Knowledge Editor: PE Pegasus Book/Media Reviews: PE Pegasus Articles Editors: PE Pegasus
Downloads
- Codebreakers Magazine - Issue #1 (March 2003) (PDF)
- Codebreakers Magazine - Issue #1 Included Files (ZIP)
- Codebreakers Magazine - Issue #2 (July 2003) (PDF)
The Other CodeBreakers Magazine
- CodeBreakers Magazine - Vol. 1, No. 1 (January 2006)
- Award BIOS Code Injection by Mappatutu Salihun Darmawan
- Cracking with Loaders: Theory, General Approach, and a Framework by Shub-Nigurrath [ARTeam], ThunderPwr [ARTeam]
- Writing Loaders for DLLs: Theory and Techniques by Shub-Nigurrath [ARTeam]
- Towards a Framework for Assembly Language Testing by Dr. Thorsten Schneider [Schneider@Secure-Software-Engineering.com]
- Embedded Reverse Engineering: Cracking Mobile Binaries by Seth Fogie [Airscanner]
- Anti Reverse Engineering Uncovered by Nicolas Brulez
- Cryptography in Data Compression by Chung-E Wang [wang@csus.edu]
The Other Other CodeBreakers Magazine
- Codebreakers Virus Magazine/Tutorial - Issue #1 by Horny Toad
- Codebreakers Virus Magazine/Tutorial - Issue #2 by Horny Toad
- Codebreakers Virus Magazine/Tutorial - Issue #3 by Horny Toad
- Codebreakers Virus Magazine/Tutorial - Issue #4 by Opic
The Other Other Other CodeBreakers Magazine
- Classes Restoration The CodeBreakers Journal - Vol. 1, No. 2 (2004)
- Award BIOS Reverse Engineering The CodeBreakers Journal - Vol. 1, No. 2 (2004)
- VX Reversing III - Yellow Fever The CodeBreakers Journal - Vol. 2, No. 1 (2005)
- Beginners Guide to Basic Linux Anti-Anti-Debugging Techniques The CodeBreakers Journal - Vol. 2, No. 2 (2005)
- Hooking Windows API - Technics of Hooking API Functions on Windows The CodeBreakers Journal - Vol. 1, No. 2 (2004)
The Fundamentals
Learn the fundamentals of Binary Auditing. Know how HLL mapping works, get more inner file understanding than ever.
Copy Protection Games
Try to solve brain-teasing puzzles with our collection of copy protection games. Increasing difficulty and unseen strange tricks.
Vulnerability Analysis
Learn how to find and analyse software vulnerability. Dig inside buffer overflows and learn how exploits can be prevented.
Malware Analysis
Start to analyse your first viruses and malware the safe way. Learn about simple tricks and how viruses look like using real-life examples.
License
As long as you retain this notice, you can do whatever you want with this stuff. If we meet some day, and you think this stuff is worth it, you can buy me a beer in return.
Important Note
The modules do NOT include runnable viruses or infected files! If your anti-virus reports an infection, this is because of specific tricks inside the exercises!
Download
You can download the free training package here: binary-auditing-training-package.zip (26M ZIP)
The password for the package is: fdcd2ff4c2180329053650f3075d39f4
Package was packed using zip under Linux. Unpacking was tested with unzip under Linux and Mac.
MD5 Hash: c2b4720549b3410385087fa1b1e28bc7
View The Binary Auditor - Beginner's Guide, by Dr. Thorsten Schneider (2011)
Content Overview
Overview of the binary auditing training package.
The training package includes all necessary files to run a complete lecture for Binary Auditing and Reverse Code Engineering at university. All files are well sorted by topics and with increasing difficulty. You need Windows XP, Windows Vista or Windows 7 to use this training package. The training package does NOT include runnable viruses!
Topic Files IDA Pro 5.0 (Free) 1 Total 324 HLL Mapping 1 (NOT for training, only as reference!) 98 HLL Mapping 2 (Start here and convert them to C) 31 Manual Decompilation (Simple exercises) 10 Algorithm Analysis 1 (Simple math exercises) 3 Algorithm Analysis 2 (Simple math exercises) 6 Crash Auditing (more complicated, why crashing?) 10 File Understanding (Simple to hard Reversemes) 31 Copy Protection Auditing (Simple to very hard) 47 Unpacking (Simple exercises) 3 Vulnerability Auditing (Simple to intermediate) 38 Malware Auditing 1 (Simple old .com/.exe exercises) 41 Malware Auditing 2 (Some fakes for analysis) 4 Malware Auditing 3 (Simple win32 analysis) 1 Disclaimer
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BU T NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTO RS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR S ERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INC LUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The Training Package for Binary Auditing was created by me, based on the work of various authors. Design based on fluid960gs.
Knowledge is Power