Solomon
September 14th, 2001, 01:47
In Win9x, with the aid of SuperBPM, IceDump, and FrogsICE, it is comparatively easy to bypass these tricks. Some tricks can be defeated manually using SoftICE/TRW2000.
But in Win2K, these tools don't work any more(I can't find the corresponding version of SoftICE to let it work with IceDump).
Recently I just want to go further on unpacking. Sure ASProtect is a good choice for practice
I have the experience of manual-unpacking earlier versions of ASProtect. But it seems difficult to find the OEP of latest version because breakpoints seldom get hit.
I heard of the following anti-debug/anti-unpacking tricks may be used in ASProtect:
1. IDT check
2. clear debug register dr0~dr7
3. MeltICE
4. INT 3 backdoor of SoftICE
5. BPX detection
6. lots of SEH
7. CRC
8. polymorph
9. API hook & redirect & emulation
......
Some of the above are privileged operations, so they need administrator token in Win2K Server.
My question is:
How to bypass the anti-debug tricks in order to find the OEP? Is there a convenient way?
Yes this target has been talked about too much but I have no clue to find the OEP yet. And thank you for your guidance.
But in Win2K, these tools don't work any more(I can't find the corresponding version of SoftICE to let it work with IceDump).
Recently I just want to go further on unpacking. Sure ASProtect is a good choice for practice

I heard of the following anti-debug/anti-unpacking tricks may be used in ASProtect:
1. IDT check
2. clear debug register dr0~dr7
3. MeltICE
4. INT 3 backdoor of SoftICE
5. BPX detection
6. lots of SEH
7. CRC
8. polymorph
9. API hook & redirect & emulation
......
Some of the above are privileged operations, so they need administrator token in Win2K Server.
My question is:
How to bypass the anti-debug tricks in order to find the OEP? Is there a convenient way?
Yes this target has been talked about too much but I have no clue to find the OEP yet. And thank you for your guidance.