OHPen
July 28th, 2007, 14:17
Hi,
i recently found a nice software product which is related to the topic of network security. After taking a deeper look at the applications kernel i saw that it seems to use a custom packer/protector which is also using obfuscation to prevent reverse engineering.
This is the entry of the application kernel:
If someone wants to take a deeper look at the application, pm me and i can provide the link. It's pretty strange to trace the app
Regards,
OHPen
i recently found a nice software product which is related to the topic of network security. After taking a deeper look at the applications kernel i saw that it seems to use a custom packer/protector which is also using obfuscation to prevent reverse engineering.
This is the entry of the application kernel:
Code:
.text:0042795E public start
.text:0042795E start: ; CODE XREF: sectio%n:004588F7j
.text:0042795E ; DATA XREF: sectio%n:004588F2o
.text:0042795E das
.text:0042795F nop
.text:00427960 pusha
.text:00427961 nop
.text:00427962 pushf
.text:00427963 test esp, esp
.text:00427965 jnz short loc_427969
.text:00427965 ; ---------------------------------------------------------------------------
.text:00427967 db 0C7h
.text:00427968 db 5
.text:00427969 ; ---------------------------------------------------------------------------
.text:00427969
.text:00427969 loc_427969: ; CODE XREF: .text:00427965j
.text:00427969 popf
.text:0042796A mov eax, fs:30h
.text:0042796F mov eax, [eax+0Ch]
.text:00427972 nop
.text:00427973 pushf
.text:00427974 test esp, esp
.text:00427976 jnz short near ptr loc_427978+2
.text:00427978
If someone wants to take a deeper look at the application, pm me and i can provide the link. It's pretty strange to trace the app

Regards,
OHPen